Skip to content
August 8, 2025

Anto ./online

Linux, Code, Cloud Computing, DevOps

  • Home
  • ☁️ Cloud 101
  • 📚 Guides
  • 🏗️ Code
  • 🔒 CyberSecurity
  • 🗒️ Cheat Sheets
  • Other
    • 🧔 About Us
    • ✨ Projects
    • 📇 Contact Us
Cheat Sheets

ProxySQL Configuration and Management Cheat Sheet

July 24, 2024July 24, 2024 - by Anto Online - Leave a Comment

This cheat sheet provides tips for setting up and managing ProxySQL for database connections. ProxySQL is a high-performance MySQL proxy that provides connection pooling, load balancing, query routing, and caching …

ProxySQL Configuration and Management Cheat Sheet Read More
Code

Delete Files from S3 Quickly with Python (asyncio)

July 23, 2024July 23, 2024 - by Anto Online - Leave a Comment

Managing large amounts of data on AWS S3 can be challenging, especially when you need to delete massive files quickly. In my scenario, I had 13 TB of files to …

Delete Files from S3 Quickly with Python (asyncio) Read More
CyberSecurity

Unveiling Network Weaknesses: Penetration Testing vs. the Cyber Kill Chain

June 24, 2024June 24, 2024 - by Anto Online - Leave a Comment

Imagine a red team simulating a cyberattack, meticulously probing your defences. Now, picture a framework dissecting the attacker’s every move. Both serve as valuable tools in your cybersecurity arsenal: penetration …

Unveiling Network Weaknesses: Penetration Testing vs. the Cyber Kill Chain Read More
CyberSecurity

Prioritize Security Threats Effectively with CVSS (Common Vulnerability Scoring System)

June 24, 2024June 24, 2024 - by Anto Online - Leave a Comment

The Forum of Incident Response and Security Teams (FIRST) developed the Common Vulnerability Scoring System (CVSS) to rate the severity of security vulnerabilities in software systems. Specifically, CVSS assigns a …

Prioritize Security Threats Effectively with CVSS (Common Vulnerability Scoring System) Read More
CyberSecurity

How to Defend Against Cyber Attacks Using MITRE ATT&CK

June 24, 2024June 24, 2024 - by Anto Online - Leave a Comment

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive framework that outlines various phases of threat actors’ attack lifecycles and their target platforms. This framework categorises malicious cyberattacks …

How to Defend Against Cyber Attacks Using MITRE ATT&CK Read More
CyberSecurity

Understanding OWASP: An Essential Guide for Developers

June 23, 2024June 23, 2024 - by Anto Online - Leave a Comment

Building secure software is no longer optional. In today’s digital world, attackers primarily target web applications. The Open Web Application Security Project (OWASP) equips developers with essential resources to combat …

Understanding OWASP: An Essential Guide for Developers Read More

Posts pagination

Previous 1 2 3 … 36 Next
  • GitHub
  • LinkedIn

Tags

Ansible AWS Bash CentOS Cheat Sheets Cloud Code CyberSecurity Debian DevOps Docker Jenkins Kali Linux NextCloud NixOS PHP Python RHEL Ubuntu WordPress

Latest Posts

Cloudflare for Websites: A Comprehensive Guide

8 hours ago8 hours ago

MalCare Plugin for WordPress: A Security Implementation Guide for Developers and Site Owners

1 day ago1 day ago

Accessibility Compliance (WCAG 2.1/2.2 AA): A Technical Brief

2 days ago2 days ago

Fixing Apt Update Issues Due to Unreachable Proxy on Ubuntu

July 1, 2025July 1, 2025

Setup Greenbone Community Edition with Docker Compose

August 17, 2024August 17, 2024

Copyright Since 2018 Anto Online ®. All rights reserved.

Important Legal stuff:
Acceptable Use Policy | Disclaimer | Privacy Policy | Terms and Conditions.

Please review the information, scripts, and instructions carefully before use. Ensure you have sufficient backups. The provided materials are offered without warranty. Consult a professional if you are unsure. The opinions expressed by Anto are our own and do not represent any other company.

We acknowledge the traditional owners of the country throughout Australia and their continuing connection to land, sea and community. We pay our respect to them and their cultures and to the elders past and present.

The feature images have been provided by pexels.com and unsplash.com.