DEV Community

Osagie Anolu profile picture

Osagie Anolu

Pastor | Software Engineer

Location Calgary, Alberta Joined Joined on  github website
Securing Cloud Environments Against Potential Extortion Threats

Securing Cloud Environments Against Potential Extortion Threats

3
Comments
3 min read

Want to connect with Osagie Anolu?

Create an account to connect with Osagie Anolu. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
🔥 Ultimate Cheat Sheet for Kubernetes Commands 🔥

🔥 Ultimate Cheat Sheet for Kubernetes Commands 🔥

1
Comments
2 min read
🚀 Mastering Docker for DevOps Success 🐳

🚀 Mastering Docker for DevOps Success 🐳

2
Comments
4 min read
Linux Commands in DevOps: A Practical Guide with Examples

Linux Commands in DevOps: A Practical Guide with Examples

49
Comments 5
3 min read
Linux Commands in DevOps: A Practical Guide with Examples

Linux Commands in DevOps: A Practical Guide with Examples

1
Comments
4 min read
Understanding Kubernetes Security: Common Vulnerabilities and Modern Solutions

Understanding Kubernetes Security: Common Vulnerabilities and Modern Solutions

5
Comments
3 min read
The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

7
Comments 1
4 min read
Building a Scalable Anti-Hate Speech Moderation Bot for Telegram: A Deep Dive

Building a Scalable Anti-Hate Speech Moderation Bot for Telegram: A Deep Dive

12
Comments
3 min read
⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

⛈️ Cloud Penetration Testing: A Practical Guide to Securing Your Cloud Infrastructure

1
Comments
3 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
Linux Kernel 6.13: Breaking New Ground in Hardware Support and System Performance

Linux Kernel 6.13: Breaking New Ground in Hardware Support and System Performance

6
Comments
3 min read
The Transformative Role of AI in Ridesharing Security

The Transformative Role of AI in Ridesharing Security

2
Comments
3 min read
Detecting and Mitigating PyPI Attacks Targeting AI Enthusiasts: A Deep Dive into JarkaStealer Campaigns

Detecting and Mitigating PyPI Attacks Targeting AI Enthusiasts: A Deep Dive into JarkaStealer Campaigns

2
Comments
3 min read
Complete AWS Guide: Cloud Computing to Website Deployment

Complete AWS Guide: Cloud Computing to Website Deployment

6
Comments
5 min read
How Hackers Exploit Ansible for Configuration Attacks: A Technical Deep Dive

How Hackers Exploit Ansible for Configuration Attacks: A Technical Deep Dive

Comments
2 min read
Getting Started with Ansible: A Complete Guide to IT Automation

Getting Started with Ansible: A Complete Guide to IT Automation

1
Comments
4 min read
Microsoft's Zero Day Quest: Bridging Security Researchers and AI Innovation

Microsoft's Zero Day Quest: Bridging Security Researchers and AI Innovation

Comments
2 min read
Cloud Ransomware: Targeting Web Applications in 2024

Cloud Ransomware: Targeting Web Applications in 2024

2
Comments 4
2 min read
Kubernetes Security: The Hidden Threats in Your Container Orchestra

Kubernetes Security: The Hidden Threats in Your Container Orchestra

2
Comments
3 min read
How AI Is Transforming IAM and Identity Security

How AI Is Transforming IAM and Identity Security

2
Comments
3 min read
Installing and Configuring WordPress on Ubuntu with Apache2

Installing and Configuring WordPress on Ubuntu with Apache2

5
Comments
3 min read
Understanding Nmap: A Developer's Guide to Network Scanning

Understanding Nmap: A Developer's Guide to Network Scanning

Comments
4 min read
Bash Scripting and Cron Jobs: Essential Tools for Automation

Bash Scripting and Cron Jobs: Essential Tools for Automation

3
Comments
3 min read
Keep calm and learn Linux

Keep calm and learn Linux

3
Comments 1
2 min read
loading...