Tony FuDevelopment security — SAST VS DAST VS IASTAbout Development security, we could always more hearing about the SAST VS DAST. So what is the differences and how they are position in…Mar 21Mar 21
Tony FuPenetration Testing: Password Cracking Tools and Use CasesDisclaimer: This blog is intended solely for educational purposes and is aimed at individuals interested in penetration testing. It is…Dec 13, 2023Dec 13, 2023
Tony FuJenkins — CI/CD pipeline with SnykLet’s us talk about the CI/CD tools — Jenkins. Jenkins is one of most famous tool for devloper to continue their work, and test and build…Nov 16, 2023Nov 16, 2023
Tony FuAWS — VPC Peering Connect VPCsThe is about the explain the connection for VPCs and how they access to the internet for individual route table. The network architecture…Nov 12, 2023Nov 12, 2023
Tony FuTekton — Build a pipeline on Kubernetes cloud native CI/CD toolsTekton as a Kubernetes cloud native CI/CD tools is seamlessly integrates with Kubernetes, offering enhanced scalability, portability, and…Nov 3, 2023Nov 3, 2023
Tony FuTerraform — Implementing Automated IAM User Permission AssignmentUsing Terraform to automate general tasks offers several advantages. It accelerates response times to user requests, minimizes…Oct 3, 2023Oct 3, 2023