Cloud Insidr

Cybersecurity in the Age of the Machine

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for AWS
Cannot sign in to AWS as IAM user with MFA? How to resync your MFA token generator

Cloud Insidr 2020-11-15 1 Comment

Cannot sign in to AWS as IAM user with MFA? How to resync your MFA token generator

Problems signing in to AWS? When the login page “Sign in as IAM user” repeatedly says: “Your authentication information is incorrect. Please try again” though you entered correct information, your Gemalto token generator for MFA authentication could be out of sync.

Sign in as IAM user: Your authentication information is incorrect
Sign in as IAM user: Your authentication information is incorrect

[Read more…]

Filed Under: AWS, cybersecurity and cyber warfare Tagged With: AWS, Gemalto, IAM, MFA

A quick guide to a solid DNS configuration using AWS Route 53 (and how to configure DNS using any other DNS service)

Anna E Kobylinska 2018-08-23 9 Comments

A quick guide to a solid DNS configuration using AWS Route 53 (and how to configure DNS using any other DNS service)

The most difficult thing about configuring the DNS settings for a domain is designing a plan of action: making up one’s mind about what kind of services you envision and how you want to route the traffic. Here’s a primer on how to configure DNS using Route 53 or any other service.

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare Tagged With: AWS, DNS, EIP, IPv4, MFA

How to use rsync to transfer files and directories between hosts

Cloud Insidr 2018-08-22 1 Comment

How to use rsync to transfer files and directories between hosts

The rsync utility can backup files, synchronize directory trees, and much much more, both on the local machine and between two different hosts—via push and pull. Here is how to tame it.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare Tagged With: AMI, AWS, remote host, rsync, secure connection, SSH

How to expand the EBS boot volume of a Linux-based EC2 instance

Cloud Insidr 2018-06-10 Leave a Comment

How to expand the EBS boot volume of a Linux-based EC2 instance

This is easier than you probably think: AWS will expand the EBS boot volume of an EC2 instance running Linux automatically when you launch a new instance off of it with the desired capacity.

Here is how it works in more detail.

[Read more…]

Filed Under: tips and tricks Tagged With: AMI, AWS, EC2, Linux

A fix for Spectre & Meltdown: update your Linux kernel in place (running CentOS/RHEL 7 or above), and live happily ever after

Cloud Insidr 2018-04-04 13 Comments

A fix for Spectre & Meltdown: update your Linux kernel in place (running CentOS/RHEL 7 or above), and live happily ever after

If you launch an instance from the official CentOS or RHEL 7.x AMI on AWS, you will be running kernel 3.1 as of this writing. That’s not a good idea. You can easily take advantage of improved security features of newer kernels that are already available in a stable release. The renowned Linux kernel maintainer Greg Kroah-Hartman released the Linux Kernel 4.14.15, which includes important fixes for Spectre & Meltdown. Here is how to update your Linux kernel from 3.1 to 4.16.11 in place.

[Read more…]

Filed Under: cybersecurity and cyber warfare, Linux Tagged With: AWS, grub, kernel, Linux

  • 1
  • 2
  • 3
  • Next Page »

Join Cloud Insidrs!

Symantec Code Signing (200x200)

Tag Cloud

automation AWS Azure Azure Active Directory Azure Arc Azure Lighthouse Azure Resource Manager certbot certificate clickjacking cron CSRF cyber security DD-WRT DNS over HTTPS DoH domain firmware Gemalto HPKP HSTS IAM letsencrypt log logs MFA MITM Netgear network router SELinux time stamp tip Whois WiFi x509 XSS
Secure Site with EV (160x600)

Pearson Education (InformIT)

Pearson Education (Peachpit)

Thawte Code Signing (200x200)

  • Content purchasing and syndication