Simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer’s data and perhaps gain admin privileges on it.
To achieve those goals of gaining access or disabling operations, a number of different technical methods are deployed by cybercriminals. …
For this we have to setup ansible to launch ec2 instance with dynamic inventory.
# TASKS TO PERFORM FOR Dynamic Inventory
-Provision EC2 instance through ansible.
-Retrieve the IP Address of instance using the dynamic inventory concept
STEP1 — Launching Ec2 instance
~ As Ansible is built on top of python, a Python Software Development Kit (SDK) is required that enables the configuration of AWS services. The package is an object-oriented API named boto3.
pip3 install boto3 //assuming python3 is installed
In this blog, we will be discussing how we will be creating a machine learning model in a Docker Container and using the model for some predictions. For the task, we will be creating a fundamental machine learning model which can predict height of son according to their father’s height.
First, we need to have Docker installed inside our Linux Operating. Here I am using RedHat Linux, so we need to configure yum to install docker. We need to create a .repo file inside our /etc/yum.repos.d/. We have created a file docker.repo, and then inside the file, we have configured…
While the IT world is embracing Containers Technology primarily for Enterprise Server Applications, There is also a huge scope of Docker Containers impacting the Desktop and Development Environment. We leverage this heavily at Admatic, where we containerise every application and service we use — further including the GUI applications and tools that we use for Day to day Development
If we want to switch to Deep Learning Dev environment — its 1 Click, If we want Android Dev Env — its just another 1 sec away, Need to integrate Computer vision Algorithms
Thanks to Docker Containers that is revolutionising the…
Placing a load balancer in front of your web server infrastructure helps ensure any spike in traffic doesn’t bring down the site.
What is a load balancer? A load balancer is an efficient way to distribute the network traffic among various backend servers. It is also known as a server farm or server pool. It distributes client requests or network load to target web servers. Load balancers work on the round-robin concept, which ensures high reliability and availability.
Step 1 — Install HAProxy
To install HAProxy, you have to use a package module where you give the name of the…
Hello Readers Today we will see how Industries are using mongoDB . For storing and managing data.
History: 10gen software company began developing MongoDB in 2007 as a component of a planned platform as a service product. In 2009, the company shifted to an open-source development model, with the company offering commercial support and other services. In 2013, 10gen changed its name to MongoDB Inc.
WHAT IS MONGODB ??
MongoDB is a document-oriented NoSQL database used for high volume data storage. Instead of using tables and rows as in the traditional relational databases, MongoDB makes use of collections and documents…
Ansible is a simple configuration management tool that automates IT orchestration, app deployment, or cloud provisioning, etc. It promotes deployment because it does not use any complex security infrastructure or agents.
In Ansible, playbooks are used to describe the automation tasks in a very simple programming language i.e. YAML. Ansible was p
rogrammed for multi-tier deployment that could manage multiple inter-related systems together.
Use Cases for Modernizing and Automating Workflows
Firstly we will configure yum repository for docker in target node for downloading docker and then we will Install docker and will start docker service
We can see docker service is running in our Target Node
An operation is idempotent if the result of performing it once is exactly the same as the result of performing it repeatedly without any intervening actions.
In general, idempotence is “the property of certain operations in mathematics and computer science that can be applied multiple times without changing the result beyond the initial application.
Here to Start httpd service we will take help of ansible.
What is ansible ?
Ansible is a popular IT automation engine that automates tasks that are either cumbersome or repetitive or complex like configuration management, cloud provisioning, software deployment, and intra-service orchestration.
Artificial intelligence is any task performed by a machine that would have previously been considered to require human intelligence.
Modern definitions of what it means to create intelligence are more specific. Francois Chollet, AI researcher at Google and creator of the machine-learning software library Keras, has said intelligence is tied to a system’s ability to adapt and improvise in a new environment, to generalise its knowledge and apply it to unfamiliar scenarios.
Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. …