CloudSavvy IT - Cloud Computing for IT Pros
Archives
Scopes in PowerShell
In many programming languages, there is the concept of scope. Defined as what variables and functions are available in what context. An example is if a variable is available to every function within a PowerShell script, or just a single defined function. PowerShell Scopes encompass several different scopes that can be used such as Global, Local, or Script scopes.
How to Debug a PowerShell Script
Any script development usually requires troubleshooting which usually results in one of two approaches. Either manually setting variables to values and outputting that data when running the script, or utilizing debugging to set breakpoints to inspect data before continuing or aborting. Built-in to PowerShell ISE and to Visual Studio Code is the ability to perform debugging.
What Are ARM CPUs, and Are They Going To Replace x86 (Intel)?
Everyone is going ARM these days—Amazon and Apple are both shipping in-house CPUs with crazy performance increases, with Microsoft rumored to be developing their own. ARM has historically been used for low power mobile chips, so why exactly is ARM crushing x86 on the desktop and server space?
Why Do They Spell Phishing With ‘ph?’ An Unlikely Homage
Back in the counter-culture days of the U.S., a group of people developed an obsession with telephone systems. It gave us the first hackers, the weird spelling of phishing, and Apple, Inc.
Getting Started With GitLab’s Continuous Integration & Deployment Pipelines (CI/CD)
Continuous Integration and Deployment, or CI/CD, is the process of streamlining and accelerating development by automatically building and testing every commit to your project. GitLab integrates CI/CD into their git solution extremely well, and we’ll show how to set it up and work with it.
How To Rotate and Delete Old Elasticsearch Records After a Month
Elasticsearch indices can quickly fill up with gigabytes of data, especially if you’re logging from multiple servers many times a second. To manage data, Elasticsearch
From Lone Wolf to Organised Crime – Where Cyber Threats Come From
There’s more than one type of threat actor, and they’re all differently skilled. Which do you need to worry about and which pose little or no threat? We explain it to you.
Why Cyber Criminals Love Cellphones
Safeguarding your data by protecting your computers? Great. Don’t forget the one in your pocket that you make calls on. Cellphone cybercrime figures increase every month. And that’s really no surprise.
How To Use AWS Textract OCR To Pull Text and Data From Documents
Many companies use human workers to do manual data entry on forms, applications, and other physical documents. While this is very accurate, it’s slow and costly. AWS Textract uses machine learning to automate this process.
Whats New At AWS reInvent 2020?
This week is AWS reInvent 2020, Amazon’s annual conference where they announce new products, services, and updates. We’ll discuss the most interesting news and what it means for the cloud computing industry.
The Trick to (Almost) Never Losing 2FA / MFA Access
Many people’s Facebook accounts are being hacked, and data leaks are rampant… We need extra security when it comes to online account protection, and 2FA / MFA is the solution. But what happens if your phone breaks? Here’s the trick…
How To Create QR Codes From The Linux Command Line
QR Codes can do a whole lot more than just take you to a web site. And they’re easy to create on the Linux command line too. We show you how.
How Online Shopping is Feeding a Phishing Frenzy
COVID-19 lockdowns, working from home, and the run-up to the festive holiday season have driven an unprecedented rise in online shopping—and a perfect opportunity for phishing attacks.