<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Swayam Patnaik</title>
    <description>The latest articles on DEV Community by Swayam Patnaik (@swayam_248).</description>
    <link>https://dev.to/swayam_248</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1461787%2Fda5d6966-d408-4a14-b3d9-45b872783e46.jpg</url>
      <title>DEV Community: Swayam Patnaik</title>
      <link>https://dev.to/swayam_248</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/swayam_248"/>
    <language>en</language>
    <item>
      <title>AWS Certified Cloud Practitioner Series – Part 2</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Thu, 09 Apr 2026 10:24:45 +0000</pubDate>
      <link>https://dev.to/swayam_248/aws-certified-cloud-practitioner-series-part-2-44ob</link>
      <guid>https://dev.to/swayam_248/aws-certified-cloud-practitioner-series-part-2-44ob</guid>
      <description>&lt;p&gt;&lt;strong&gt;Security, Storage, Scaling, and High Availability in AWS&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this article, I continue my AWS Certified Cloud Practitioner learning series by covering core AWS compute, storage, networking security, scalability, and availability concepts. These topics are extremely important from both exam and real‑world DevOps perspectives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Groups&lt;/strong&gt;&lt;br&gt;
Security Groups act as virtual firewalls that control inbound and outbound traffic for EC2 instances.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Inbound Rules&lt;/strong&gt;&lt;br&gt;
Allowing HTTP (TCP 80) from anywhere (0.0.0.0/0) enables users to view an EC2 instance in a web browser.&lt;br&gt;
If a Security Group is misconfigured, a timeout error typically occurs when trying to access the instance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Outbound Rules&lt;/strong&gt;&lt;br&gt;
By default, outbound rules allow IPv4 – All Traffic.&lt;br&gt;
This configuration gives the EC2 instance full outbound connectivity to anywhere.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F230jexso7ht666jotzay.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F230jexso7ht666jotzay.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SSH Access&lt;/strong&gt;&lt;br&gt;
Port 22 (SSH) from anywhere is required to connect to the instance using any of the four AWS-supported connection methods after clicking Connect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Amazon EBS (Elastic Block Store)&lt;/strong&gt;&lt;br&gt;
EBS volumes are network drives attached to EC2 instances. The data stored on them persists even after the instance is terminated.&lt;br&gt;
(Think of an EBS volume like a pen drive.)&lt;/p&gt;

&lt;p&gt;Root Volume&lt;br&gt;
Delete on Termination is enabled by default.&lt;br&gt;
This can be checked under the instance’s storage settings.&lt;/p&gt;

&lt;p&gt;Additional EBS Volumes&lt;br&gt;
Delete on Termination is disabled by default (important for the exam).&lt;br&gt;
An EBS volume can be attached to only one instance at a time, but a single instance can have multiple EBS volumes attached.&lt;/p&gt;

&lt;p&gt;Availability Zone Scope&lt;br&gt;
EBS volumes are AZ‑specific and can only be attached to EC2 instances in the same AZ.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Snapshots&lt;/strong&gt;&lt;br&gt;
A snapshot is a backup of an EBS volume.&lt;br&gt;
Snapshots are used to move EBS volumes across AZs.&lt;br&gt;
Detaching the volume before taking a snapshot is not required, but it is recommended.&lt;br&gt;
Snapshots are stored at the region level, allowing movement across AZs.&lt;br&gt;
Snapshots can also be copied across regions for disaster recovery.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Snapshot Archive&lt;/strong&gt;&lt;br&gt;
Snapshots can be moved to an archive tier, which is 75% cheaper.&lt;br&gt;
Restoring archived snapshots takes 24–72 hours.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recycle Bin for EBS Snapshots&lt;/strong&gt;&lt;br&gt;
Allows recovery of accidentally deleted snapshots.&lt;br&gt;
Setup path:&lt;br&gt;
Recycle Bin → Create Retention Rule → Resource Type (EBS Snapshots) → Rule Lock Settings (Unlock)&lt;br&gt;
Retention period: 1 day to 1 year&lt;/p&gt;

&lt;p&gt;Fast Snapshot Restore&lt;br&gt;
Forces full initialization of a snapshot.&lt;br&gt;
Removes latency during first use.&lt;br&gt;
Example: Moving a Volume Across AZs&lt;/p&gt;

&lt;p&gt;Snapshots can also be copied to other regions for disaster recovery.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fazwhd5ssqfybqgmg2ltd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fazwhd5ssqfybqgmg2ltd.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;EC2 Instance Store&lt;/strong&gt; &lt;br&gt;
Used when high‑performance hardware disk is required.&lt;br&gt;
Delivers better I/O performance than EBS.&lt;br&gt;
Ephemeral storage – data is lost when the instance is stopped.&lt;br&gt;
Common use cases:&lt;br&gt;
Buffers&lt;br&gt;
Caches&lt;br&gt;
Temporary content&lt;br&gt;
Scratch data&lt;/p&gt;

&lt;p&gt;High risk of data loss.&lt;br&gt;
Backup and replication are the user’s responsibility.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fviufsg22kbnbgbwsxon9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fviufsg22kbnbgbwsxon9.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AMI (Amazon Machine Image)&lt;br&gt;
AMIs are customized images of EC2 instances.&lt;/p&gt;

&lt;p&gt;Purpose of AMIs:&lt;br&gt;
Include OS, software, configurations, monitoring, and licenses.&lt;br&gt;
New instances can be launched without repeated configuration.&lt;br&gt;
Helps to add your own software licenses (exam point).&lt;br&gt;
Faster boot and configuration time.&lt;/p&gt;

&lt;p&gt;AMI Characteristics&lt;br&gt;
Types:&lt;br&gt;
Public AMIs (AWS-provided).&lt;br&gt;
Own AMIs (created and maintained by us).&lt;br&gt;
AWS Marketplace AMIs (third‑party, may be paid).&lt;/p&gt;

&lt;p&gt;AMI Creation Flow&lt;br&gt;
Start and customize instance&lt;br&gt;
Stop instance (for data integrity)&lt;br&gt;
Create AMI (EBS snapshots created automatically)&lt;br&gt;
Launch new instances from the AMI&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;EC2 Image Builder&lt;/strong&gt;&lt;br&gt;
Automatically builds, tests, and distributes AMIs.&lt;br&gt;
Automates image management.&lt;br&gt;
Used for VM or container image creation.&lt;br&gt;
Runs on a schedule.&lt;br&gt;
Free service.&lt;/p&gt;

&lt;p&gt;Flow:&lt;br&gt;
EC2 Image Builder → Builder EC2 Instance → New AMI → Test EC2 Instance → AMI distributed (multiple regions).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjzqiwqm235l462i3lqcr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjzqiwqm235l462i3lqcr.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Amazon EFS (Elastic File System)&lt;/strong&gt;&lt;br&gt;
Fully managed network file system.&lt;br&gt;
Can be mounted on hundreds of EC2 instances.&lt;br&gt;
Works with Linux EC2 instances across multiple AZs.&lt;br&gt;
High availability and scalability.&lt;br&gt;
Expensive, pay‑per‑use, no capacity planning.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjd2wt6cfu7dfi36cdh9a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjd2wt6cfu7dfi36cdh9a.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;EBS vs EFS&lt;/strong&gt;&lt;br&gt;
EBS supports snapshots.&lt;br&gt;
EFS provides a shared file system across AZs.&lt;/p&gt;

&lt;p&gt;EFS‑IA&lt;br&gt;
Cost‑optimized storage class.&lt;br&gt;
Stores files that are infrequently accessed.&lt;/p&gt;

&lt;p&gt;Shared Responsibility Model – EC2 Storage&lt;/p&gt;

&lt;p&gt;AWS Responsibilities:&lt;br&gt;
Infrastructure&lt;br&gt;
Data replication for EBS and EFS&lt;br&gt;
Replacing faulty hardware&lt;br&gt;
Zero‑day issues&lt;/p&gt;

&lt;p&gt;User Responsibilities:&lt;br&gt;
Backup and snapshot configuration&lt;br&gt;
Data encryption&lt;br&gt;
Data stored on drives&lt;br&gt;
Understanding risks of EC2 Instance Store&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS FSx (File Systems)&lt;/strong&gt;&lt;br&gt;
Fully managed high‑performance file systems when EFS or S3 are not suitable.&lt;br&gt;
FSx for Windows File Server&lt;/p&gt;

&lt;p&gt;Native Microsoft Windows file system&lt;br&gt;
Supports SMB and NTFS&lt;br&gt;
Highly reliable and scalable&lt;br&gt;
Accessible from AWS and on‑premises&lt;/p&gt;

&lt;p&gt;FSx for Lustre&lt;br&gt;
High Performance Computing (HPC) Linux file system&lt;br&gt;
Used for ML, analytics, video processing, financial modeling&lt;br&gt;
Scales to hundreds of GB/s&lt;br&gt;
Millions of IOPS with sub‑millisecond latency&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scalability Concepts&lt;/strong&gt;&lt;br&gt;
Vertical Scalability&lt;br&gt;
Increase instance size (e.g., t2.micro → t2.small)&lt;br&gt;
Common for non‑distributed systems like databases&lt;br&gt;
Hardware limits apply&lt;/p&gt;

&lt;p&gt;Horizontal Scalability&lt;br&gt;
Increase number of instances&lt;br&gt;
Used in distributed systems&lt;br&gt;
Common for web and modern applications&lt;br&gt;
Implemented using EC2&lt;/p&gt;

&lt;p&gt;High Availability&lt;br&gt;
Application running in at least two AZs.&lt;br&gt;
Helps survive data loss&lt;br&gt;
Tightly coupled with horizontal scaling&lt;/p&gt;

&lt;p&gt;Key Definitions&lt;br&gt;
Scalability: Ability to handle increased load.&lt;br&gt;
Elasticity: Automatic scaling once system is scalable.&lt;br&gt;
Agility: Speed of resource provisioning.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fped6ef9tozwcjmj7z8xh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fped6ef9tozwcjmj7z8xh.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Load Balancers&lt;/strong&gt;&lt;br&gt;
Load Balancers distribute incoming traffic across multiple servers.&lt;/p&gt;

&lt;p&gt;Benefits&lt;br&gt;
Distributes traffic evenly.&lt;br&gt;
Single DNS entry for applications.&lt;br&gt;
Health checks on instances.&lt;br&gt;
SSL termination.&lt;br&gt;
Managed by AWS (ELB).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Load Balancers do not perform backend autoscaling — Auto Scaling Groups are required.&lt;/em&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  &lt;strong&gt;## Types of Load Balancers&lt;/strong&gt;
&lt;/h1&gt;

&lt;p&gt;Application Load Balancer:&lt;br&gt;
HTTP/HTTPS, gRPC, Layer 7, static DNS&lt;br&gt;
Network Load Balancer:&lt;br&gt;
TCP/UDP/TLS, high performance, static IP, Layer 4&lt;br&gt;
Gateway Load Balancer:&lt;br&gt;
GENEVE protocol, traffic inspection/firewalls, Layer 3&lt;br&gt;
Classic Load Balancer:&lt;br&gt;
Layer 4 and 7 (retired in 2023)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupqd6qcsuf182uv9hcqu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupqd6qcsuf182uv9hcqu.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>aws</category>
      <category>cloudpractitioner</category>
      <category>certification</category>
    </item>
    <item>
      <title>AWS Certified Cloud Practitioner Series – Part 1: Cloud Foundations</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Mon, 16 Mar 2026 10:35:39 +0000</pubDate>
      <link>https://dev.to/swayam_248/aws-certified-cloud-practitioner-series-part-1-cloud-foundations-3c9j</link>
      <guid>https://dev.to/swayam_248/aws-certified-cloud-practitioner-series-part-1-cloud-foundations-3c9j</guid>
      <description>&lt;p&gt;How My Cloud Journey Began&lt;br&gt;
My interest in Cloud Computing started back in the second year of my B.Tech journey.&lt;br&gt;
Like many students, I didn’t fully understand what "the cloud" meant at first. But curiosity pushed me to explore. I started by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reading blogs and articles on the internet.&lt;/li&gt;
&lt;li&gt;Watching videos and documentation.&lt;/li&gt;
&lt;li&gt;Connecting with Cloud Engineers, DevOps Engineers, and SREs on LinkedIn.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As I went deeper, I realized that cloud is not just a technology—it's a fundamental shift in how modern applications are built, deployed, and scaled.&lt;br&gt;
I explored various certifications that help build a strong foundation, such as:&lt;br&gt;
AWS Certified Cloud Practitioner&lt;br&gt;
AWS Certified Solutions Architect - Associate&lt;br&gt;
AWS Certified SysOps Administrator - Associate&lt;/p&gt;

&lt;p&gt;Fast forward to today:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I’m working as a DevOps Engineer&lt;/li&gt;
&lt;li&gt;I’ve cleared the AWS Certified Cloud Practitioner exam
And I’m now sharing my learning to help beginners start their cloud journey with confidence
This article is the first step in that series.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What Is Cloud Computing?&lt;/strong&gt;&lt;br&gt;
Cloud Computing is the on‑demand delivery of IT resources using a pay‑as‑you‑go pricing model.&lt;br&gt;
Instead of owning physical hardware, organizations rent resources such as compute, storage, databases, and applications. The key advantage is that users pay only for what they use and can scale resources up or down instantly based on requirements.&lt;br&gt;
In the AWS cloud, AWS owns and maintains the data centers, hardware, and networking infrastructure. As users, we provision and manage resources using the AWS Management Console, Command Line Interface (CLI), or APIs, without worrying about the underlying physical infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Deployment Models&lt;/strong&gt;&lt;br&gt;
Cloud adoption can follow different deployment models depending on organizational needs.&lt;br&gt;
A Private Cloud is used by a single organization and is not exposed to the public. It provides complete control over the infrastructure and is commonly used to meet strict compliance and business‑specific requirements.&lt;br&gt;
A Public Cloud is owned and operated by third‑party cloud providers such as AWS. In this model, resources are shared securely among multiple customers and offer high scalability and cost effectiveness.&lt;br&gt;
A Hybrid Cloud combines on‑premises infrastructure with cloud services. In this approach, some workloads remain private while others run in the cloud, offering flexibility and gradual cloud adoption.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CAPEX vs OPEX&lt;/strong&gt;: A Major Cloud Advantage&lt;br&gt;
One of the most significant advantages of cloud computing is the shift from Capital Expenditure (CAPEX) to Operational Expenditure (OPEX).&lt;br&gt;
With cloud computing, organizations no longer need to make upfront investments in hardware or commit to long‑term infrastructure ownership. Instead, they pay only when they use resources, based on actual consumption.&lt;br&gt;
This model enables organizations to go global within minutes, while benefiting from high flexibility, scalability, elasticity, high availability, fault tolerance, and faster innovation with improved agility.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Service Models&lt;/strong&gt;&lt;br&gt;
Cloud services are delivered through different service models based on responsibility and control.&lt;br&gt;
Infrastructure as a Service (IaaS) provides full control over servers and operating systems. A common example is Amazon EC2, where users manage the OS and applications while AWS manages the underlying infrastructure.&lt;br&gt;
Platform as a Service (PaaS) allows users to focus on application code, while AWS manages the infrastructure. AWS Elastic Beanstalk is an example of this model.&lt;br&gt;
Software as a Service (SaaS) delivers complete applications to end users. In this model, users simply consume the application without managing infrastructure. Gmail is a common example.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Pricing Fundamentals&lt;/strong&gt;&lt;br&gt;
AWS follows a pay‑as‑you‑go pricing model based on three core pillars.&lt;br&gt;
Users pay for compute, which is the compute time consumed by resources.&lt;br&gt;
 They also pay for storage, based on the amount of data stored.&lt;br&gt;
 For data transfer, incoming traffic to AWS is free, while outgoing traffic is chargeable&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Global Infrastructure&lt;/strong&gt;&lt;br&gt;
AWS infrastructure is designed to deliver high availability and low latency across the globe.&lt;br&gt;
AWS operates in Regions, which are geographical areas such as us-east-1. Each region is a cluster of data centers. When choosing a region, factors such as data compliance, proximity to customers, service availability, and pricing are considered.&lt;br&gt;
Within each region are Availability Zones (AZs). Every region has a minimum of three AZs, and each AZ consists of one or more data centers. Availability Zones are isolated from one another but connected using ultra‑low latency, high‑bandwidth networking, enabling fault‑tolerant architectures.&lt;br&gt;
To further reduce latency, AWS uses Edge Locations, which consist of 400+ Points of Presence. These are used by Amazon CloudFront to deliver content to end users with low latency&lt;/p&gt;

&lt;p&gt;Why I Recommend AWS Certified Cloud Practitioner&lt;br&gt;
For anyone who is new to cloud computing, the AWS Certified Cloud Practitioner certification provides a strong starting point.&lt;br&gt;
This certification helps build solid foundational knowledge and focuses on explaining why cloud computing exists, rather than diving straight into complex services. It covers essential areas such as pricing, security, and basic cloud architecture, making it easier for beginners to understand how AWS works at a high level.&lt;/p&gt;

&lt;p&gt;In the further posts, I will specifically focus on the other services and concepts included in the AWS Certified Cloud Practitioner (CLF) exam, such as &lt;em&gt;Security Groups, Amazon EBS, EC2 Instance Store, AMIs, EC2 Image Builder, Amazon EFS, the Shared Responsibility Model for EC2 storage, scalability concepts, Auto Scaling Groups, and Load Balancers.&lt;/em&gt;&lt;br&gt;
This progression is intentional, so that each topic builds on the previous one and helps learners develop a clear and practical understanding of AWS fundamentals.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>cloudpractitioner</category>
      <category>certification</category>
    </item>
    <item>
      <title>What Is DeepSeek? Why Is DeepSeek Suddenly Everywhere? Why Is It Shaking Up the AI World?</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Thu, 30 Jan 2025 05:40:52 +0000</pubDate>
      <link>https://dev.to/swayam_248/what-is-deepseek-why-is-deepseek-suddenly-everywhere-why-is-it-shaking-up-the-ai-world-250f</link>
      <guid>https://dev.to/swayam_248/what-is-deepseek-why-is-deepseek-suddenly-everywhere-why-is-it-shaking-up-the-ai-world-250f</guid>
      <description>&lt;p&gt;DeepSeek is a Chinese artificial intelligence (AI) company. It was founded by Liang Wenfeng in 2023.&lt;/p&gt;

&lt;p&gt;Recently on January 20, DeepSeek has welcomed its latest AI model, R1 which is good at problem solving, writing and providing the same results with fewer resources as compared to other AI models&lt;/p&gt;

&lt;p&gt;DeepSeek has suddenly become a competitor to OpenAI as the key factor contributing to DeepSeek's popularity is the cost-effective approach it has come with to train the AI model.&lt;/p&gt;

&lt;p&gt;"As DeepSeek continues to evolve, questions about AI’s future efficiency, accessibility, and global competition remain open. One thing is certain - DeepSeek is a name we’ll be hearing a lot more about."&lt;br&gt;
Click &lt;a href="https://www.linkedin.com/posts/swayampatnaik17_ai-artificialintelligence-openai-activity-7290333932108099584-RL9G?utm_source=social_share_sheet&amp;amp;utm_medium=member_desktop_web" rel="noopener noreferrer"&gt;DeepSeek&lt;/a&gt; to learn more about DeepSeek&lt;/p&gt;

</description>
      <category>deepseek</category>
      <category>ai</category>
      <category>openai</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>The Body Shop of Security: Biometrics</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Sat, 22 Jun 2024 19:48:39 +0000</pubDate>
      <link>https://dev.to/swayam_248/the-body-shop-of-security-biometrics-2hba</link>
      <guid>https://dev.to/swayam_248/the-body-shop-of-security-biometrics-2hba</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Biometrics is a physical security technique that makes use of a person's physical characteristics which are unique to that person.&lt;br&gt;
This technique is used to authenticate the user's identity and grant access to the certain things. It is a kind of personal touch for authentication which can only be done by the genuine user. &lt;/p&gt;

&lt;h2&gt;
  
  
  Types of Biometrics
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;_Physiological : _&lt;/strong&gt; Physiological Biometrics is based on a person's body's unique features like fingerprints, facial recognition, iris scan, etc. This system of authentication is difficult to forge as compared to passwords. This type of security will remain constant throughout the person's life as physiological traits are generally stable. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;_Behavioral : _&lt;/strong&gt; Behavioral Biometrics is based on how a person interacts with the system like typing pattern, voice patterns, mouse movements, touchscreen interactions, etc. This system instead of relying on physical features, analyze how a person interacts with the devices to identify the user. It works invisibly as they can adapt to the changing habits over time which offers a continuous security. Limited data on a new user can make initial identification difficult. &lt;/p&gt;

&lt;h2&gt;
  
  
  Advantages
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Elimination of the need of remembering complex passwords.&lt;/li&gt;
&lt;li&gt;Unauthorised access is equal to none as it is difficult to impersonate someone completely but &lt;a href="https://dev.to/swayam_248/deepfake-nightmares-mitigating-the-threat-of-ai-fueled-masquerade-attacks-388k"&gt;Deepfake&lt;/a&gt; stands as an exception.&lt;/li&gt;
&lt;li&gt;Biometrics is generally faster as compared to manual entry of passwords. Even if &lt;a href="https://dev.to/swayam_248/password-managers-the-future-of-logins-5dkc"&gt;Password Managers&lt;/a&gt; do autofill the login credentials, biometrics is generally considered as the fastest option.&lt;/li&gt;
&lt;li&gt;Accuracy level is high.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Disadvantages
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Accuracy limit is one of the concerns when the system refuses to identify the genuine user incase of inadequate light during facial recognition, dirty fingers during fingerprint validation. False positives may cause trouble sometimes.&lt;/li&gt;
&lt;li&gt;Storing the biometrics data is a challenging task.&lt;/li&gt;
&lt;li&gt;Some biometrics security operations are costly such as iris recognition. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Biometrics offer a secure and speedy way to ditch passwords, but privacy concerns need to be addressed for wider trust.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>learning</category>
      <category>productivity</category>
    </item>
    <item>
      <title>Password Managers - The Future of Logins.</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Wed, 22 May 2024 18:18:19 +0000</pubDate>
      <link>https://dev.to/swayam_248/password-managers-the-future-of-logins-5dkc</link>
      <guid>https://dev.to/swayam_248/password-managers-the-future-of-logins-5dkc</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;Password managers are digital tools that help users to suggest, create, store and access passwords along with usernames whenever required. Password managers ensure creating strong and unique passwords which will be strongly encrypted. Users only need to remember one Master Password which will grant access to all the stored Passwords. This single point of entry raises concern sometimes, but managers use strong robust encryption techniques to safeguard this crucial key.&lt;br&gt;
Convenience is the key benefit. Password managers do autofill login information on websites and apps which remove the need of manual entry. This saves time and reduces the risk of typos. Companies include zero-knowledge encryption, which ensures the company itself cannot access our passwords. This ensures even more security. If someone is accessing the password manager, additional layer of security is applied which requires the device's password to be entered.&lt;br&gt;
Eg- If you are trying to access your google password manager from your laptop, you will be asked to enter your laptop's password to get access to all the stored passwords.&lt;/p&gt;

&lt;p&gt;Similar to a coin, Password Managers also have two sides.&lt;/p&gt;

&lt;h2&gt;
  
  
  Pros of Password Managers.
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Reduced risk of Phishing attacks:&lt;/strong&gt;Phishing scams tries to trick users into revealing their login credentials on fake websites. Password managers helps by automatically filling stored login informations only on trusted websites.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Platform Compatibility:&lt;/strong&gt;We can access our passwords on different devices such as Desktops, Laptops, Mobiles etc. which are logged in through same accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encryption:&lt;/strong&gt;They provide strong encryption(AES) to protect your passwords from cyber criminals. However, they aren't 100% impenetrable. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Improved Password Hygiene:&lt;/strong&gt; Password managers identify weak or reused passwords and prompt updates, allowing or suggesting for password changes during data breaches.&lt;/p&gt;

&lt;h2&gt;
  
  
  Cons of Password Managers.
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Single point of failure:&lt;/strong&gt; All the stored passwords are protected by one Master password which if compromised, can breach all the stored passwords. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Adaptibility:&lt;/strong&gt;Password managers don’t always adapt with every web-based application, which in turn forces the users to remember the password.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Backup:&lt;/strong&gt; All password managers do not offer easy backup and restore options which results in data loss.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vendor Security Breach:&lt;/strong&gt; A security breach at the password manager company can lead to expose your data(in encrypted form), although encryption makes it difficult to crack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Device Risk:&lt;/strong&gt; If our device with the password manager is lost or stolen, accessing the vault might be possible. Strong passwords on device and biometrics can help to tackle this risk.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;While there are number of drawbacks of password managers, such as single point of failure and vendor security breach, the security advantages remove these concerns for most of the users. Creation of strong master password, enabling two-factor authentication, and choosing a reputable password manager can significantly lower the risks for data breach.&lt;/p&gt;

&lt;p&gt;Some popular password managers we can consider are :&lt;br&gt;
&lt;em&gt;1Password&lt;/em&gt;, &lt;em&gt;Dashlane&lt;/em&gt;, &lt;em&gt;NordPass&lt;/em&gt;, &lt;em&gt;Keeper&lt;/em&gt;, etc.&lt;/p&gt;

&lt;p&gt;Ultimately convenience should not come by compromising security. Password managers bridge this gap by offering a seamless way to manage complex passwords while saving you time.&lt;/p&gt;

</description>
      <category>security</category>
      <category>opensource</category>
      <category>cybersecurity</category>
      <category>learning</category>
    </item>
    <item>
      <title>Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Tue, 14 May 2024 18:03:17 +0000</pubDate>
      <link>https://dev.to/swayam_248/deepfake-nightmares-mitigating-the-threat-of-ai-fueled-masquerade-attacks-388k</link>
      <guid>https://dev.to/swayam_248/deepfake-nightmares-mitigating-the-threat-of-ai-fueled-masquerade-attacks-388k</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;The digital world solely relies on authenticity and privacy. We connect with friends and family, conduct business, and consume information, all based on the belief that what we see online is real. Now we are in a world where everything available online can't be trusted - a world of &lt;strong&gt;&lt;em&gt;DEEPFAKE&lt;/em&gt;&lt;/strong&gt;  where the &lt;strong&gt;&lt;em&gt;MASQUERADE&lt;/em&gt;&lt;/strong&gt; of authenticity is easily done by anyone with an internet connection.&lt;br&gt;
But what exactly are masquerade and deepfakes, and how do they work?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Masquerade Attacks&lt;/strong&gt;- Attackers impersonate genuine users or systems to gain unauthorised access to sensitive informations which will look as a authorised access. Hackers often obtain the username and password to get access which becomes their mask which prevents them from being caught.They can also identify weak points in a network which becomes their entry points. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deepfake&lt;/strong&gt; is basically an image or recording that has been intentionally altered which misrepresents someone as doing or saying something which was infact never done by him/her. It is a &lt;em&gt;machine learning generated image,video or audio&lt;/em&gt; which replaces human's face or body with that of some other person. &lt;br&gt;
Deepfakes can be used for entertainment purposes, like creation of humorous immitation. But on the other hand it can also be used for heinous activities like spreading misinformation, impersonating someone in a video to damage their reputations and many more. &lt;br&gt;
As AI technology continues to develop, it is harder to disguise them from real footage.&lt;/p&gt;

&lt;h2&gt;
  
  
  Masquerading through Deepfake
&lt;/h2&gt;

&lt;p&gt;2FA(Two Factor Authentication) was introduced to add an extra layer of security to protect personal/sensitive information. But now  a deepfake video can be used to bypass a 2FA or multi-factor authentication systems that rely on face recognition. Facial recognition systems find it difficult to differentiate between actual human and a deepfake video which permits the attacker to get through the 2FA system. &lt;br&gt;
Therefore Multi-Factor Authentication should not only include facial recognition, rather it should be combined with other methods such as One-Time Passwords(OTP), verifying from the account already logged in from different device, requirement to answer previously set questions, etc.&lt;/p&gt;

&lt;h2&gt;
  
  
  Fightback against Deepfakes
&lt;/h2&gt;

&lt;p&gt;One should cross-check the informations before sharing.&lt;br&gt;
Users should be educated to tackle the Deepfakes like noticing unnatural body language, awkward lip syncing, not believing evidence from untrusted sources, etc. &lt;br&gt;
Phising attacks are often used to steal login credentials, so one should be cautious of suspicious emails and verify the sender initially.&lt;br&gt;
Data sharing practices should be checked as the less personal data available publicly, the harder it will become for the attackers to create a convinving deepfake.&lt;br&gt;
Ultimately by staying up to date, informed, knowing the possible threats, we can protect ourselves and also our information from deepfake fueled masquerade attacks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The future of deepfake remains uncertain. As deepfakes become more sophisticated, so will the methods for detecting and mitigating them. However, technology alone won't win this battle. The human element is also crucial. Deepfakes may pose a challenge, but they don't have to be a nightmare unless we are taking care of our personal informations. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In the age of deepfakes, seeing is no longer believing.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>learning</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Blurry no more: Understanding image resolution</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Fri, 10 May 2024 16:03:48 +0000</pubDate>
      <link>https://dev.to/swayam_248/blurry-no-more-understanding-image-resolution-nbc</link>
      <guid>https://dev.to/swayam_248/blurry-no-more-understanding-image-resolution-nbc</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
In the context of screens and monitors, pixels can be defined as &lt;em&gt;tiny individual squares that light up to create an image&lt;/em&gt;. The resolutions(144p,240p,360p,480p,720p,1080p,4k and 8k) signifies number of pixels. Higher resolution means there will be more number of pixels which results in a clearer image. We can say it as the physics of how the light works.&lt;br&gt;
Now let's get introduced to &lt;em&gt;Pixel Upscaling&lt;/em&gt;. &lt;br&gt;
&lt;em&gt;Pixel Upscaling&lt;/em&gt; basically refers to the process where a video existing with a lower resolution(144p or 240p) is converted to a high resolution(1080p or 4k). This is done by analyzing the existing pixels and creating new pixels which will fill the gap.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upscaling Techniques&lt;/strong&gt;&lt;br&gt;
Clever algorithms are used to estimate what new pixels can be added to fill in the gaps and create a higher resolution image.&lt;/p&gt;

&lt;p&gt;Some common upscaling techniques:&lt;br&gt;
&lt;em&gt;Nearest Neighbour Interpolation&lt;/em&gt; - This method copies the nearest existing pixel to create new ones. It is simple, speed, computationally efficient and no new data is created. It simply relies on existing information or pixels.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Deep Learning Upscaling&lt;/em&gt; - It makes use of Artificial Intelligence to analyze the video and create more detailed new pixels. This method includes steps like Training the Model, Analyzing the low-resolution input, Creation of new pixels and Data Enhancement. This technique is computationally expensive.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Bilinear Interpolation&lt;/em&gt; - This method takes the average color of the four nearest neighbouring pixels to create new pixels.  It produces smoother results than nearest neighbour but may blur the details.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
The world of video is constantly evolving with upscaling technology being at the top. The most low-resolution videos can be enjoyed in stunning detail. So next time when you watch an old video, remember the power of upscaling. It bridges the gap between the past and the present. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The future of video is not just about capturing high-resolution content, it's about making everything we have captured look its absolute best.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>resolution</category>
      <category>technology</category>
      <category>opensource</category>
      <category>performance</category>
    </item>
    <item>
      <title>Beyond "password123"</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Tue, 07 May 2024 18:02:40 +0000</pubDate>
      <link>https://dev.to/swayam_248/beyond-password123-l64</link>
      <guid>https://dev.to/swayam_248/beyond-password123-l64</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;In today's digitalised world, it's more important than ever to create strong passwords which protect our online accounts from getting any unauthorised access. From social media accounts to bank statements, vast amount of personal datas do reside on the web which needs to be protected. So just "password123" as a password just won't fix the issue of making the data transparent. &lt;/p&gt;

&lt;p&gt;Hackers use a variety of techniques to crack passwords and weak passwords are easy to guess. Some of the methods used by them are Brute-force attacks, Dictionary attacks and Social Engineering.&lt;/p&gt;

&lt;h2&gt;
  
  
  Type of attacks
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Brute-force attacks&lt;/em&gt;: AI Bots systematically try every possible combination of characters until the password is guessed.&lt;br&gt;
&lt;em&gt;Dictionary attacks&lt;/em&gt;: Trying out common words and phrases which are  found in dictionaries to guess passwords.&lt;br&gt;
&lt;em&gt;Social engineering&lt;/em&gt;: Tricking users to reveal their passwords through phishing scams or malware.&lt;/p&gt;

&lt;h2&gt;
  
  
  Building Unbreakable Passwords
&lt;/h2&gt;

&lt;p&gt;We can create a strong passwords by keeping in mind the basic 3 requirements for making passwords : length, complexity and uniqueness.&lt;br&gt;
The longer the &lt;em&gt;length&lt;/em&gt; is, the more complex it will be to guess/crack it. Until then the system would have detected about it being an unauthorised access.&lt;br&gt;
Usage of letters with a mix of uppercase and lowercase letters, numbers and symbols is highly recommended which will make the password more &lt;em&gt;complex&lt;/em&gt; to guess.&lt;br&gt;
We should restrict ourselves from reusing the same passwords accross different accounts. Our passwords should be &lt;em&gt;unique&lt;/em&gt; for different accounts. A single compromised password can leave all our accounts vulnerable.&lt;/p&gt;

&lt;p&gt;We can also use Password Managers. These tools generate as well as store strong, unique passwords for every accounts by removing the complexity neccesity to remember every password.&lt;/p&gt;

&lt;h2&gt;
  
  
  Additional Security Measures
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Two-factor Authentication (2FA)&lt;/em&gt;: This adds up an extra layer of security by requiring a secondary code from your phone or email in addition to your password while logging in.&lt;br&gt;
&lt;em&gt;Logout When Finished&lt;/em&gt;: Don't stay logged in to your accounts on public or shared devices. Log out completely when you're done using a service.&lt;br&gt;
&lt;em&gt;Secure Wi-Fi Connections&lt;/em&gt;: Avoid using public Wi-Fi networks for sensitive activities like online banking or entering passwords. If you have to somehow use public Wi-Fi, consider using a Virtual Private Network (VPN) which encrypts your traffic.&lt;br&gt;
&lt;em&gt;Regular Software Updates&lt;/em&gt;: Keep your operating system, web browsers, and applications updated with the latest security patches which address vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;By following the above steps, we can significantly enhance our online security posture. Investment of time and effort in creating unbreakable passwords is a necessity which will ultimately keep our accounts safe.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ksh4m0qo3q2fmkqni2e.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ksh4m0qo3q2fmkqni2e.jpg" alt="Image description" width="720" height="656"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>opensource</category>
      <category>learning</category>
    </item>
    <item>
      <title>Brute Force Attacks and CAPTCHA</title>
      <dc:creator>Swayam Patnaik</dc:creator>
      <pubDate>Fri, 03 May 2024 08:32:03 +0000</pubDate>
      <link>https://dev.to/swayam_248/brute-force-attack-and-captcha-4cde</link>
      <guid>https://dev.to/swayam_248/brute-force-attack-and-captcha-4cde</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
In an increasingly interconnected world of digitalisation, security and maintenance of data is the utmost priority. Among the countless existing threats, Brute Force Attacks stand out as a persistent menace. In Brute Force Attack, automated bots are capable of conducting a trial and error method to crack login credentials, passwords, encryption keys, etc. To prevent these attack, we need robust defenses against such attacks. One of such prevention techniques is Enter CAPTCHA.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About Brute Force Attack&lt;/strong&gt;&lt;br&gt;
Brute Force Attack is one of the existing tactics for gaining unauthorised access to individual accounts, organisations' systems and networks. This method relies on sheer computational power and persistence. Hackers systematically try every possible combination of characters until the find the correct one. There are several softwares available online which can perform a Brute Force Attacks such as &lt;em&gt;John the Ripper and L0phtCrack&lt;/em&gt;. &lt;br&gt;
Brute Force Attacks are slower as they have to try every single combinations possible, for example : a five-charactered password typically takes longer to Brute Force as compared to a four-charactered password.However if the target is sufficiently long, it could take months and even years for a Brute Force attacker to crack the target. Currently most of the sites require a longer password which makes it difficult to Brute Force.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About CAPTCHA&lt;/strong&gt;&lt;br&gt;
CAPTCHA stands for &lt;em&gt;Completely Automated Public Turing test to tell Computers and Humans Apart&lt;/em&gt;. It is basically designed to determine whether the end user is a human or a bot/computer program. It involves the methods which ask the users to perform various tasks which can only be solved by a human but will be difficult for the bots such as &lt;em&gt;identifying distorted text, puzzle solving, selecting images as per the instructions&lt;/em&gt; and many more.&lt;br&gt;
When the server will notice too many login attempts or registration attempts, it will suspect it as a Brute Force Attack even though the end user might be a Human. To verify the end user, it produces a CAPTCHA which will identify whether the user is a Human or a Bot. Some examples of CAPTCHA are &lt;em&gt;Text-Based CAPTCHA,  ReCAPTCHA, 3DCAPTCHA, Mathematical CAPTCHA, Image-Based CAPTCHA&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
As we have explored in this article, the symbiotic relationship between Brute Force Attacks and CAPTCHA depicts the ongoing battle between the attackers and defenders in cyberspace. While the former tries to exploit weakness in security protocols, the latter serves as a preserver.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cryptography</category>
      <category>learning</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
