Knowledge Academy

Advancing Knowledge, Transforming Lives

Digging deep into dig command

Digging deep into dig command

DIG stands for Domain Information Groper. As the name suggests it is used to grab information from a DNS server. It is one of the most powerful yet most underrated utility. Sometimes we get overwhelmed by all the information that is shown and...

Things that you should know about DNS

Things that you should know about DNS

In this article I will explain you things that you should know about DNS. We think we all know what DNS is and how it works, but we get sloppy at times. So, I decided to dig deep into DNS. I decided to write what I learned. I may not be able to...

Networking Architecture – Hybrid

Networking Architecture – Hybrid

Yet another interesting architecture including AWS services like AWS Site-to-Site VPN, PrivateLink and Transit Gateway. This solution enables connectivity between a Corporate Data Center and workloads deployed in AWS Environment. Let’s say we want...

What to do when you can’t chmod chmod?

What to do when you can’t chmod chmod?

When you cannot chmod chmod? What to do? This might help to re-instate permission back. Here are following techniques where you can use chmod to change permission when chmod itself is not executable. Using rsync: The first technique is to use rsync...

Encrypting Systems Manager Sessions

Encrypting Systems Manager Sessions

I recently discovered that we can encrypt ec2 sessions launched via AWS Systems Manager. I figured it needs a few things in place to make it happen, A KMS key to be used for encrypting sessions with the following policy attached to it. Refrence...

Future of Technologies: Blockchain

Future of Technologies: Blockchain

"Everything will be tokenized and connected by blockchain one day" - Fred Ehrsam Blockchain was invented by group of people using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoin.What really...

VPC Ingress Routing

VPC Ingress Routing

The VPC incoming network traffic would have to be forwarded to on-premises appliance or firewall in order to inspect the traffic and routed back to VPC which is not an ideal solution, it adds latency and complexity. A route table is associated with...

VPC Basics

VPC Basics

Amazon VPC (Virtual Private Cloud) is a virtual network infrastructure like a physical datacenter, which provides network connectivity to all the resources deployed in that VPC. There are few key concepts for VPCs which you should understand: VPC-...

Digging deep into dig command

Digging deep into dig command

DIG stands for Domain Information Groper. As the name suggests it is used to grab information from a DNS server. It is one of the most powerful yet most underrated utility. Sometimes we get overwhelmed by all the information that is shown and...

Things that you should know about DNS

Things that you should know about DNS

In this article I will explain you things that you should know about DNS. We think we all know what DNS is and how it works, but we get sloppy at times. So, I decided to dig deep into DNS. I decided to write what I learned. I may not be able to...

Networking Architecture – Hybrid

Networking Architecture – Hybrid

Yet another interesting architecture including AWS services like AWS Site-to-Site VPN, PrivateLink and Transit Gateway. This solution enables connectivity between a Corporate Data Center and workloads deployed in AWS Environment. Let’s say we want...

What to do when you can’t chmod chmod?

What to do when you can’t chmod chmod?

When you cannot chmod chmod? What to do? This might help to re-instate permission back. Here are following techniques where you can use chmod to change permission when chmod itself is not executable. Using rsync: The first technique is to use rsync...

Encrypting Systems Manager Sessions

Encrypting Systems Manager Sessions

I recently discovered that we can encrypt ec2 sessions launched via AWS Systems Manager. I figured it needs a few things in place to make it happen, A KMS key to be used for encrypting sessions with the following policy attached to it. Refrence...

Future of Technologies: Blockchain

Future of Technologies: Blockchain

"Everything will be tokenized and connected by blockchain one day" - Fred Ehrsam Blockchain was invented by group of people using the name Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoin.What really...

VPC Ingress Routing

VPC Ingress Routing

The VPC incoming network traffic would have to be forwarded to on-premises appliance or firewall in order to inspect the traffic and routed back to VPC which is not an ideal solution, it adds latency and complexity. A route table is associated with...

VPC Basics

VPC Basics

Amazon VPC (Virtual Private Cloud) is a virtual network infrastructure like a physical datacenter, which provides network connectivity to all the resources deployed in that VPC. There are few key concepts for VPCs which you should understand: VPC-...