A hacker can escalate privileges in a domain in many ways, and learning how they work is half the battle in reducing your attack surface. In this post, we’ll go through five ways that a non-privileged user (from now on only called “user”) can utilize to own your network and how you can protect yourself.
Graph databases are a special kind of database storing complex data structures that would be infeasible to store in a traditional relational database. They’re most notably used for social networks, as they’re much more performant for certain queries.
AWS Lambda functions are a way to run code without provisioning or managing your own servers. Rather than running an always-online application, they run a single function in the cloud, which can be triggered in response to API events or other events in your AWS account.
An “API” is the middleware that sits in between two applications, and allows them to communicate using predefined rules. In practice, APIs are typically used to allow client-side applications to access an otherwise protected database.
If you need version control for your projects, want to host it yourself, but don’t want to use barebones git, you can set up a Gitlab server to store all of your code while providing easy access through a web interface.
Regex, short for regular expression, is often used in programming languages for matching patterns in strings, find and replace, input validation, and reformatting text. Learning how to properly use Regex can make working with text much easier.
Machine learning is a huge industry, and AWS has a whole section of services dedicated to it. We’ll explain what they’re offering, from services for running ML models to their prebuilt AI-powered services that you can integrate directly with your app.