Change layout
AWS Free Tier Cloud Messaging

How You Can Use AWS Free Tier: SQS, SNS, SES

How You Can Use AWS Free Tier: SQS, SNS, SES

This is the third in a three-part series covering the Amazon Web Services (AWS) free tier. In our previous articles, we reviewed the free tier for the AWS compute and database offerings. In this article, you will learn about the messaging options provided by AWS. We will cover Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), and Amazon Simple Email Service (SES). Continue reading

Don’t miss new articles!
Thank you for subscribing!
VPN data leaks protection

How to Check Your VPN for Data Leaks

How to Check Your VPN for Data Leaks

Just a few short years ago, virtual private networks (VPNs) were a novel technology to the masses. The advanced security and anonymity they offered were only for paranoids and dissidents. Fast forward to today’s internet with its daily headlines of massive data breaches, government snooping, and a Dark Web with an endless appetite for your personal information. Continue reading

Don’t miss new articles!
Thank you for subscribing!
Resize Amazon Volume

How to Resize an Amazon Elastic Block Store Volume

How to Resize an Amazon Elastic Block Store Volume

Reaching a capacity limit in Amazon Elastic Block Storage (EBS)? Need more IOPS for an app or web-service? Due to its design, Amazon EBS doesn’t allow to scale the volume size dynamically or extend volume IOPS. If a user needs more space, he has to buy another Amazon EBS volume and then spend hours to backup data from the original volume, verify its consistency and then restore on the new one.

This article is a step-by-step guide on how to use AWS built-in features to easily resize the Amazon EBS volume.
Continue reading

IAM Identities

Amazon S3 Security Part 3: IAM Identities

Amazon S3 Security Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading

IAM Identities

AWS Security Part 2: Basics of IAM Policies

AWS Security Part 2: Basics of IAM Policies

This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading

Load more