Geek Logbook

Tech sea log book

50projectsIn50days – Day 28: Git Hub profile

Fetching GitHub user information is the core task of this project. This involves interacting with the GitHub API, which is facilitated using the Axios library. The script is embedded in the HTML as follows: The HTML itself is initially empty. The creation of the user card and error card is handled by JavaScript functions. The

 Escape sequences in Pyhon

Escape sequences as in C While reading Automate the Boring Stuff with Python: Practical Programming for Total Beginners, I noticed the existence of raw strings. A raw string is created in such a way that escape sequences listed in the Python documentation are not processed. In fact, at the beginning of the section on Lexical

Dictionary methods: keys(), values(), and items()

In Python, there are three special methods related to dictionaries that are worth mentioning: keys(), values(), and items(). Interestingly, these methods do not return true lists. They cannot be modified and do not have an append() method. However, dict_keys, dict_values, and dict_items can be used in for loops. This distinction is important to keep in

50projectsIn50days – Day 27: Toast Notification

Toastify is a well-known library that helps create Toast Notification on your website. You can find the npm project here: toastify-js However, in this projects, we replicate the same behaviour but using the native functions provided by the browser. The HTML includes a simple button class btn In the JavaScript you will find the messages

Minimizing Operational Overhead of EC2 Fleet OS Security Governance in AWS: Recommendations for DevOps Teams

Minimizing the operational overhead of EC2 fleet OS security governance is essential for maintaining a secure and efficient AWS environment. In this blog post, we’ll explore the challenges faced by DevOps teams in managing EC2 fleet OS security and provide recommendations to minimize operational overhead. Challenges in EC2 Fleet OS Security Governance Managing the security

Implementing Resilient Architectures in AWS: Strategies for Automated Recovery and Testing

Implementing resilient architectures in AWS is essential for ensuring high availability and reliability of your applications. In this blog post, we’ll explore strategies for automating recovery and testing to improve the resilience of your AWS environment. Monitoring for Key Performance Indicators (KPIs) Monitoring your workload for key performance indicators (KPIs) is essential for detecting and

Enabling Traceability and Auditing Security Events in AWS: Best Practices and Tools

Traceability and auditing of security events are crucial for maintaining the security and compliance of your AWS environment. In this blog post, we’ll explore how to enable traceability and auditing in AWS, including monitoring, alerting, and auditing actions and changes in your environment. Importance of Traceability and Auditing Traceability and auditing allow you to: Tools

Data Protection and Security Events in AWS: Best Practices for Ensuring Data Security

Protecting data in transit and at rest is critical for maintaining the security and compliance of your AWS environment. In this blog post, we’ll explore best practices for classifying and protecting data, as well as tools and services available in AWS for data protection and security event management. Classifying Data and Defining Protection Controls Data

Automating Security Best Practices in AWS: A Guide to Efficient and Secure Operations

Automating security best practices in AWS is essential for ensuring the security, scalability, and efficiency of your cloud environment. In this blog post, we’ll explore the benefits of automation, key strategies for automating security, and best practices to follow. Benefits of Automating Security Automating security best practices offers several key benefits: Key Strategies for Automating

Authentication and Federation in AWS: Best Practices and Implementation Strategies

Authentication and federation are critical components of any AWS environment, ensuring secure access to resources and services. In this blog post, we’ll explore the different types of identity in AWS, AWS policy types, and best practices for implementing authentication and federation. Types of Identity in AWS AWS supports various types of identity, each serving different