- 扫描 ID:
- 2eba6777-6ba8-4084-a790-ffc9ae19f164已完成
- 提交的 URL:
- https://medium.com/feed/@sidneyngafei
- 报告完成时间:
链接 · 找到 0 个
从页面中识别出的传出链接
JavaScript 变量 · 找到 3 个
在页面窗口对象上加载的全局 JavaScript 变量是在函数外部声明的变量,可以从当前范围内的代码中的任何位置访问
名称 | 类型 |
---|---|
onbeforetoggle | object |
onscrollend | object |
documentPictureInPicture | object |
控制台日志消息 · 找到 1 条
记录到 Web 控制台的消息
类型 | 类别 | 记录 |
---|---|---|
error | security |
|
HTML
页面的原始 HTML 正文
<html xmlns="http://www.w3.org/1999/xhtml"><head><style id="xml-viewer-style">/* Copyright 2014 The Chromium Authors
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*/
:root {
color-scheme: light dark;
}
div.header {
border-bottom: 2px solid black;
padding-bottom: 5px;
margin: 10px;
}
@media (prefers-color-scheme: dark) {
div.header {
border-bottom: 2px solid white;
}
}
div.folder > div.hidden {
display:none;
}
div.folder > span.hidden {
display:none;
}
.pretty-print {
margin-top: 1em;
margin-left: 20px;
font-family: monospace;
font-size: 13px;
}
#webkit-xml-viewer-source-xml {
display: none;
}
.opened {
margin-left: 1em;
}
.comment {
white-space: pre;
}
.folder-button {
user-select: none;
cursor: pointer;
display: inline-block;
margin-left: -10px;
width: 10px;
background-repeat: no-repeat;
background-position: left top;
vertical-align: bottom;
}
.fold {
background: url("data:image/svg+xml,<svg xmlns='http://www.w3.org/2000/svg' fill='%23909090' width='10' height='10'><path d='M0 0 L8 0 L4 7 Z'/></svg>");
height: 10px;
}
.open {
background: url("data:image/svg+xml,<svg xmlns='http://www.w3.org/2000/svg' fill='%23909090' width='10' height='10'><path d='M0 0 L0 8 L7 4 Z'/></svg>");
height: 10px;
}
</style></head><body><div id="webkit-xml-viewer-source-xml"><rss xmlns="" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html" version="2.0">
<channel>
<title><![CDATA[Stories by Sidney Ndikum on Medium]]></title>
<description><![CDATA[Stories by Sidney Ndikum on Medium]]></description>
<link>https://medium.com/@sidneyngafei?source=rss-720b1ca0dada------2</link>
<image>
<url>https://cdn-images-1.medium.com/fit/c/150/150/1*nMEtg-xBjCqJ5APDuzC5YA.jpeg</url>
<title>Stories by Sidney Ndikum on Medium</title>
<link>https://medium.com/@sidneyngafei?source=rss-720b1ca0dada------2</link>
</image>
<generator>Medium</generator>
<lastBuildDate>Mon, 16 Dec 2024 20:08:56 GMT</lastBuildDate>
<atom:link href="https://medium.com/@sidneyngafei/feed" rel="self" type="application/rss+xml"/>
<webMaster><![CDATA[[email protected]]]></webMaster>
<atom:link href="http://medium.superfeedr.com" rel="hub"/>
<item>
<title><![CDATA[Could we refer to a Cloud Architect as a Human API?]]></title>
<link>https://medium.com/@sidneyngafei/could-we-refer-to-a-cloud-architect-as-a-human-api-44cfc3441490?source=rss-720b1ca0dada------2</link>
<guid isPermaLink="false">https://medium.com/p/44cfc3441490</guid>
<category><![CDATA[api]]></category>
<category><![CDATA[cloud-security]]></category>
<category><![CDATA[microservices]]></category>
<category><![CDATA[solutionsarchitect]]></category>
<category><![CDATA[hybrid-cloud-computing]]></category>
<dc:creator><![CDATA[Sidney Ndikum]]></dc:creator>
<pubDate>Wed, 14 Jun 2023 16:43:06 GMT</pubDate>
<atom:updated>2023-06-14T16:43:06.752Z</atom:updated>
<content:encoded><![CDATA[<p>Could we refer to a Cloud Architect as a Human API?</p><p>With cloud technology being the game changer in the tech world today and most organizations adopting it to enjoy its scalability advantage, cloud architects play a critical role in this adoption.</p><p>With the main function of a cloud architect being designing and selling cloud architectures, they tend to act as APIs (Application Programming Interface) used in application microservice deployment that is, they talk with stakeholders of organizations, listen to their business needs and design architectures with respect to what the business needs and transmits the information down to their DevOps team to build applications that will match what the organization requires. After the design is done and tested, the cloud architect then presents the architecture to the stakeholders in a language that they will understand as they are not tech savvy.</p><p>Looking at this scenario, a cloud architect could be called a Human API in an organization.</p><p>#cloudcomputing#cloudarchitect#api#microservice#cloudsercurity</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=44cfc3441490" width="1" height="1" alt="">]]></content:encoded>
</item>
<item>
<title><![CDATA[Virtual Firewall]]></title>
<link>https://medium.com/@sidneyngafei/virtual-firewall-d630630ef341?source=rss-720b1ca0dada------2</link>
<guid isPermaLink="false">https://medium.com/p/d630630ef341</guid>
<dc:creator><![CDATA[Sidney Ndikum]]></dc:creator>
<pubDate>Fri, 05 May 2023 14:40:31 GMT</pubDate>
<atom:updated>2023-05-05T14:40:31.537Z</atom:updated>
<content:encoded><![CDATA[<p>As businesses increasingly move their operations to the cloud, concerns around security have become more prevalent. In a public cloud provider, such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP), virtual firewalls can play a crucial role in protecting the network and resources from cyber threats. In this blog post, we’ll take a closer look at virtual firewalls in public cloud providers and their benefits.</p><p><strong>What is a virtual firewall?</strong></p><p>A virtual firewall, also known as a <strong>cloud firewall</strong>, is a firewall that operates in a virtualized environment. Unlike physical firewalls that are deployed on-premises, virtual firewalls are software-based and run on virtual machines (VMs) within a cloud environment. A virtual firewall is designed to protect a cloud network by inspecting incoming and outgoing traffic and blocking any unauthorized access attempts.</p><p><strong>How does a virtual firewall work?</strong></p><p>Virtual firewalls operate similarly to physical firewalls. They use a set of predefined rules to inspect incoming and outgoing traffic and determine whether it should be allowed or denied. These rules can be configured to filter traffic based on protocols, source IP addresses, destination IP addresses, and ports. In addition, virtual firewalls can also inspect application layer traffic and block any suspicious or malicious activity.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/270/1*DRIOiMDx6Db3MgW0TlOJLw.jpeg" /></figure><p><strong>Benefits of virtual firewalls in public cloud providers</strong></p><p>Enhanced security: Virtual firewalls provide an additional layer of security to the cloud environment. By inspecting incoming and outgoing traffic, they can prevent unauthorized access attempts and block any malicious activity.</p><p>Cost-effective: Since virtual firewalls are software-based, they can be deployed and managed at a lower cost compared to physical firewalls. This makes them an attractive option for businesses that want to enhance their security without incurring significant expenses.</p><p>Scalability: Virtual firewalls can be easily scaled up or down based on the changing needs of the business. This means that businesses can add or remove virtual firewalls as their cloud environment grows or shrinks.</p><p>Centralized management: Virtual firewalls in public cloud providers can be centrally managed through a web-based interface or an API. This allows businesses to easily configure and manage their virtual firewalls from a single location.</p><p>Integration with other security tools: Virtual firewalls can be integrated with other security tools, such as intrusion detection systems (IDS) and security information and event management (SIEM) systems, to provide a comprehensive security solution.</p><p>To wrap it up, Virtual firewalls are a crucial component of cloud security in public cloud providers. They provide enhanced security, are cost-effective, scalable, can be centrally managed, and can be integrated with other security tools. With virtual firewalls, businesses can protect their cloud environment from cyber threats and ensure the safety of their resources and data.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d630630ef341" width="1" height="1" alt="">]]></content:encoded>
</item>
</channel>
</rss></div><div class="header"><span>This XML file does not appear to have any style information associated with it. The document tree is shown below.</span><br /></div><div class="pretty-print"><div class="folder" id="folder0"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><rss<span class="html-attribute"> <span class="html-attribute-name">xmlns:dc</span>="<span class="html-attribute-value">http://purl.org/dc/elements/1.1/</span>"</span><span class="html-attribute"> <span class="html-attribute-name">xmlns:content</span>="<span class="html-attribute-value">http://purl.org/rss/1.0/modules/content/</span>"</span><span class="html-attribute"> <span class="html-attribute-name">xmlns:atom</span>="<span class="html-attribute-value">http://www.w3.org/2005/Atom</span>"</span><span class="html-attribute"> <span class="html-attribute-name">xmlns:cc</span>="<span class="html-attribute-value">http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html</span>"</span><span class="html-attribute"> <span class="html-attribute-name">version</span>="<span class="html-attribute-value">2.0</span>"</span>></span></div><div class="opened"><span>
</span><div class="folder" id="folder1"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><channel></span></div><div class="opened"><span>
</span><div class="folder" id="folder2"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><title></span></div><div class="opened"><div class="line"><span><![CDATA[ Stories by Sidney Ndikum on Medium ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></title></span></div></div><span>
</span><div class="folder" id="folder3"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><description></span></div><div class="opened"><div class="line"><span><![CDATA[ Stories by Sidney Ndikum on Medium ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></description></span></div></div><span>
</span><div class="line"><span class="html-tag"><link></span><span>https://medium.com/@sidneyngafei?source=rss-720b1ca0dada------2</span><span class="html-tag"></link></span></div><span>
</span><div class="folder" id="folder4"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><image></span></div><div class="opened"><span>
</span><div class="line"><span class="html-tag"><url></span><span>https://cdn-images-1.medium.com/fit/c/150/150/1*nMEtg-xBjCqJ5APDuzC5YA.jpeg</span><span class="html-tag"></url></span></div><span>
</span><div class="line"><span class="html-tag"><title></span><span>Stories by Sidney Ndikum on Medium</span><span class="html-tag"></title></span></div><span>
</span><div class="line"><span class="html-tag"><link></span><span>https://medium.com/@sidneyngafei?source=rss-720b1ca0dada------2</span><span class="html-tag"></link></span></div><span>
</span></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></image></span></div></div><span>
</span><div class="line"><span class="html-tag"><generator></span><span>Medium</span><span class="html-tag"></generator></span></div><span>
</span><div class="line"><span class="html-tag"><lastBuildDate></span><span>Mon, 16 Dec 2024 20:08:56 GMT</span><span class="html-tag"></lastBuildDate></span></div><span>
</span><div class="line"><span class="html-tag"><atom:link<span class="html-attribute"> <span class="html-attribute-name">href</span>="<span class="html-attribute-value">https://medium.com/@sidneyngafei/feed</span>"</span><span class="html-attribute"> <span class="html-attribute-name">rel</span>="<span class="html-attribute-value">self</span>"</span><span class="html-attribute"> <span class="html-attribute-name">type</span>="<span class="html-attribute-value">application/rss+xml</span>"</span>/></span></div><span>
</span><div class="folder" id="folder5"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><webMaster></span></div><div class="opened"><div class="line"><span><![CDATA[ [email protected] ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></webMaster></span></div></div><span>
</span><div class="line"><span class="html-tag"><atom:link<span class="html-attribute"> <span class="html-attribute-name">href</span>="<span class="html-attribute-value">http://medium.superfeedr.com</span>"</span><span class="html-attribute"> <span class="html-attribute-name">rel</span>="<span class="html-attribute-value">hub</span>"</span>/></span></div><span>
</span><div class="folder" id="folder6"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><item></span></div><div class="opened"><span>
</span><div class="folder" id="folder7"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><title></span></div><div class="opened"><div class="line"><span><![CDATA[ Could we refer to a Cloud Architect as a Human API? ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></title></span></div></div><span>
</span><div class="line"><span class="html-tag"><link></span><span>https://medium.com/@sidneyngafei/could-we-refer-to-a-cloud-architect-as-a-human-api-44cfc3441490?source=rss-720b1ca0dada------2</span><span class="html-tag"></link></span></div><span>
</span><div class="line"><span class="html-tag"><guid<span class="html-attribute"> <span class="html-attribute-name">isPermaLink</span>="<span class="html-attribute-value">false</span>"</span>></span><span>https://medium.com/p/44cfc3441490</span><span class="html-tag"></guid></span></div><span>
</span><div class="folder" id="folder8"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><category></span></div><div class="opened"><div class="line"><span><![CDATA[ api ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></category></span></div></div><span>
</span><div class="folder" id="folder9"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><category></span></div><div class="opened"><div class="line"><span><![CDATA[ cloud-security ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></category></span></div></div><span>
</span><div class="folder" id="folder10"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><category></span></div><div class="opened"><div class="line"><span><![CDATA[ microservices ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></category></span></div></div><span>
</span><div class="folder" id="folder11"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><category></span></div><div class="opened"><div class="line"><span><![CDATA[ solutionsarchitect ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></category></span></div></div><span>
</span><div class="folder" id="folder12"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><category></span></div><div class="opened"><div class="line"><span><![CDATA[ hybrid-cloud-computing ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></category></span></div></div><span>
</span><div class="folder" id="folder13"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><dc:creator></span></div><div class="opened"><div class="line"><span><![CDATA[ Sidney Ndikum ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></dc:creator></span></div></div><span>
</span><div class="line"><span class="html-tag"><pubDate></span><span>Wed, 14 Jun 2023 16:43:06 GMT</span><span class="html-tag"></pubDate></span></div><span>
</span><div class="line"><span class="html-tag"><atom:updated></span><span>2023-06-14T16:43:06.752Z</span><span class="html-tag"></atom:updated></span></div><span>
</span><div class="folder" id="folder14"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><content:encoded></span></div><div class="opened"><div class="line"><span><![CDATA[ <p>Could we refer to a Cloud Architect as a Human API?</p><p>With cloud technology being the game changer in the tech world today and most organizations adopting it to enjoy its scalability advantage, cloud architects play a critical role in this adoption.</p><p>With the main function of a cloud architect being designing and selling cloud architectures, they tend to act as APIs (Application Programming Interface) used in application microservice deployment that is, they talk with stakeholders of organizations, listen to their business needs and design architectures with respect to what the business needs and transmits the information down to their DevOps team to build applications that will match what the organization requires. After the design is done and tested, the cloud architect then presents the architecture to the stakeholders in a language that they will understand as they are not tech savvy.</p><p>Looking at this scenario, a cloud architect could be called a Human API in an organization.</p><p>#cloudcomputing#cloudarchitect#api#microservice#cloudsercurity</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=44cfc3441490" width="1" height="1" alt=""> ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></content:encoded></span></div></div><span>
</span></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></item></span></div></div><span>
</span><div class="folder" id="folder15"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><item></span></div><div class="opened"><span>
</span><div class="folder" id="folder16"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><title></span></div><div class="opened"><div class="line"><span><![CDATA[ Virtual Firewall ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></title></span></div></div><span>
</span><div class="line"><span class="html-tag"><link></span><span>https://medium.com/@sidneyngafei/virtual-firewall-d630630ef341?source=rss-720b1ca0dada------2</span><span class="html-tag"></link></span></div><span>
</span><div class="line"><span class="html-tag"><guid<span class="html-attribute"> <span class="html-attribute-name">isPermaLink</span>="<span class="html-attribute-value">false</span>"</span>></span><span>https://medium.com/p/d630630ef341</span><span class="html-tag"></guid></span></div><span>
</span><div class="folder" id="folder17"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><dc:creator></span></div><div class="opened"><div class="line"><span><![CDATA[ Sidney Ndikum ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></dc:creator></span></div></div><span>
</span><div class="line"><span class="html-tag"><pubDate></span><span>Fri, 05 May 2023 14:40:31 GMT</span><span class="html-tag"></pubDate></span></div><span>
</span><div class="line"><span class="html-tag"><atom:updated></span><span>2023-05-05T14:40:31.537Z</span><span class="html-tag"></atom:updated></span></div><span>
</span><div class="folder" id="folder18"><div class="line"><span class="folder-button fold"></span><span class="html-tag"><content:encoded></span></div><div class="opened"><div class="line"><span><![CDATA[ <p>As businesses increasingly move their operations to the cloud, concerns around security have become more prevalent. In a public cloud provider, such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP), virtual firewalls can play a crucial role in protecting the network and resources from cyber threats. In this blog post, we’ll take a closer look at virtual firewalls in public cloud providers and their benefits.</p><p><strong>What is a virtual firewall?</strong></p><p>A virtual firewall, also known as a <strong>cloud firewall</strong>, is a firewall that operates in a virtualized environment. Unlike physical firewalls that are deployed on-premises, virtual firewalls are software-based and run on virtual machines (VMs) within a cloud environment. A virtual firewall is designed to protect a cloud network by inspecting incoming and outgoing traffic and blocking any unauthorized access attempts.</p><p><strong>How does a virtual firewall work?</strong></p><p>Virtual firewalls operate similarly to physical firewalls. They use a set of predefined rules to inspect incoming and outgoing traffic and determine whether it should be allowed or denied. These rules can be configured to filter traffic based on protocols, source IP addresses, destination IP addresses, and ports. In addition, virtual firewalls can also inspect application layer traffic and block any suspicious or malicious activity.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/270/1*DRIOiMDx6Db3MgW0TlOJLw.jpeg" /></figure><p><strong>Benefits of virtual firewalls in public cloud providers</strong></p><p>Enhanced security: Virtual firewalls provide an additional layer of security to the cloud environment. By inspecting incoming and outgoing traffic, they can prevent unauthorized access attempts and block any malicious activity.</p><p>Cost-effective: Since virtual firewalls are software-based, they can be deployed and managed at a lower cost compared to physical firewalls. This makes them an attractive option for businesses that want to enhance their security without incurring significant expenses.</p><p>Scalability: Virtual firewalls can be easily scaled up or down based on the changing needs of the business. This means that businesses can add or remove virtual firewalls as their cloud environment grows or shrinks.</p><p>Centralized management: Virtual firewalls in public cloud providers can be centrally managed through a web-based interface or an API. This allows businesses to easily configure and manage their virtual firewalls from a single location.</p><p>Integration with other security tools: Virtual firewalls can be integrated with other security tools, such as intrusion detection systems (IDS) and security information and event management (SIEM) systems, to provide a comprehensive security solution.</p><p>To wrap it up, Virtual firewalls are a crucial component of cloud security in public cloud providers. They provide enhanced security, are cost-effective, scalable, can be centrally managed, and can be integrated with other security tools. With virtual firewalls, businesses can protect their cloud environment from cyber threats and ensure the safety of their resources and data.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d630630ef341" width="1" height="1" alt=""> ]]></span></div></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></content:encoded></span></div></div><span>
</span></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></item></span></div></div><span>
</span></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></channel></span></div></div><span>
</span></div><span class="folded hidden">...</span><div class="line"><span class="html-tag"></rss></span></div></div></div></body></html>