Cyber attack definition

Simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer’s data and perhaps gain admin privileges on it.

8 types of cyber attack

To achieve those goals of gaining access or disabling operations, a number of different technical methods are deployed by cybercriminals. …

In this blog we will see how we can create a load balancer setup or reverseproxy setup on Aws cloud with the help of ansible and with help on ansible we will retrive ip of ec2 instance dynamically and automate whole process.

For this we have to setup ansible to launch ec2 instance with dynamic inventory.

# TASKS TO PERFORM FOR Dynamic Inventory

-Provision EC2 instance through ansible.

-Retrieve the IP Address of instance using the dynamic inventory concept

STEP1 — Launching Ec2 instance

~ As Ansible is built on top of python, a Python Software Development Kit (SDK) is required that enables the configuration of AWS services. The package is an object-oriented API named boto3.

pip3 install boto3   //assuming python3 is installed
  • Here, the RedHat system itself calls the API for configuration on AWS, and this procedure is done on the…

In this blog, we will be discussing how we will be creating a machine learning model in a Docker Container and using the model for some predictions. For the task, we will be creating a fundamental machine learning model which can predict height of son according to their father’s height.

First, we need to have Docker installed inside our Linux Operating. Here I am using RedHat Linux, so we need to configure yum to install docker. We need to create a .repo file inside our /etc/yum.repos.d/. We have created a file docker.repo, and then inside the file, we have configured…

In this blog we will see how to use jupyter notebook in docker container.

While the IT world is embracing Containers Technology primarily for Enterprise Server Applications, There is also a huge scope of Docker Containers impacting the Desktop and Development Environment. We leverage this heavily at Admatic, where we containerise every application and service we use — further including the GUI applications and tools that we use for Day to day Development

If we want to switch to Deep Learning Dev environment — its 1 Click, If we want Android Dev Env — its just another 1 sec away, Need to integrate Computer vision Algorithms

Thanks to Docker Containers that is revolutionising the…

Placing a load balancer in front of your web server infrastructure helps ensure any spike in traffic doesn’t bring down the site.

What is a load balancer? A load balancer is an efficient way to distribute the network traffic among various backend servers. It is also known as a server farm or server pool. It distributes client requests or network load to target web servers. Load balancers work on the round-robin concept, which ensures high reliability and availability.

Steps to configure HAProxy

Step 1 — Install HAProxy

To install HAProxy, you have to use a package module where you give the name of the…

Hello Readers Today we will see how Industries are using mongoDB . For storing and managing data.

History: 10gen software company began developing MongoDB in 2007 as a component of a planned platform as a service product. In 2009, the company shifted to an open-source development model, with the company offering commercial support and other services. In 2013, 10gen changed its name to MongoDB Inc.


MongoDB is a document-oriented NoSQL database used for high volume data storage. Instead of using tables and rows as in the traditional relational databases, MongoDB makes use of collections and documents…


Ansible is a simple configuration management tool that automates IT orchestration, app deployment, or cloud provisioning, etc. It promotes deployment because it does not use any complex security infrastructure or agents.

In Ansible, playbooks are used to describe the automation tasks in a very simple programming language i.e. YAML. Ansible was p

rogrammed for multi-tier deployment that could manage multiple inter-related systems together.

Use Cases for Modernizing and Automating Workflows

  • Weekly system reboot: There’s nothing worse than doing the same thing for 8 hours a day! Eliminate repetitive, manual processes with automation.
  • Enforce security guidelines: Rules are rules. It’s best…


  1. Configure Docker.
  2. Start and enable Docker services.
  3. Pull the httpd server image from the Docker Hub.
  4. Run the httpd container and expose it to the public.
  5. Copy the html code in the/var/www/html directory and start the webserver.


  1. Should have 2 linux os yum configured.
  2. Download ansible in master node and configure inventory file Hosts.

Starting with Downloading Docker

Firstly we will configure yum repository for docker in target node for downloading docker and then we will Install docker and will start docker service

We can see docker service is running in our Target Node


An operation is idempotent if the result of performing it once is exactly the same as the result of performing it repeatedly without any intervening actions.

In general, idempotence is “the property of certain operations in mathematics and computer science that can be applied multiple times without changing the result beyond the initial application.

Here to Start httpd service we will take help of ansible.

What is ansible ?

Ansible is a popular IT automation engine that automates tasks that are either cumbersome or repetitive or complex like configuration management, cloud provisioning, software deployment, and intra-service orchestration.

What is…

What is Artificial Intelligence (AI) ?

In older words

Artificial intelligence is any task performed by a machine that would have previously been considered to require human intelligence.

Modern definitions of what it means to create intelligence are more specific. Francois Chollet, AI researcher at Google and creator of the machine-learning software library Keras, has said intelligence is tied to a system’s ability to adapt and improvise in a new environment, to generalise its knowledge and apply it to unfamiliar scenarios.

Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. …

Ashish Dwivedi

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store