tech exchange

✔tech news✔information✔tips and tricks

Tuesday, 12 October 2021

October 12, 2021

AWS Identity and Access Management - 2021

 

            AWS Identity and Access Management - 2021



AWS Identity and Access Management (IAM) permits you to have numerous clients in your AWS account. On the off chance that you utilized Amazon Web Services (AWS), the best way to deal with your substance on AWS is to give a username and secret key or access keys. This is a genuine security issue for the greater part of us. IAM doesn't need to share passwords and access keys. 


Continually changing the principle AWS secret word or producing another vital when a representative leaves our group is only a chaotic arrangement. AWS Identity and Access Management (IAM) was a decent beginning, permitting individual client accounts with individual keys. In any case, since we are S3/CloudFront clients, CloudFront was added to IAM to watch in the event that it happened last. The executives (IAM) support CloudFront. IAM began in 2010 and incorporates S3 support


I discovered the documentation for this help somewhat dispersed. There are a few outsider items that offer extensions for help for character and access to the executives (IAM). In any case, engineers are by and large economical, so they searched for a free answer for overseeing IAM with the Amazon S3 administration. 


This article strolls you through the most common way of setting up an order line interface with IAM backing and setting up gatherings/clients with S3 access. Before you begin designing Identity and Access Management (IAM), you need to set up your Amazon AWS S3 account. My article, Amazon Simple Storage Service (S3), will direct you bit by bit through setting up an AWS S3 account.

Here are the steps to set up and implement users in IAM. This is for Windows but can be adapted for use on Linux, UNIX, and/or Mac OSX.

  1. Command-line interface (CLI) installation and configuration
  2. Create a group
  3. Granting Group Access to S3 Bucket and CloudFront
  4. Create a user and add it to a group
  5. Create login profile and create key
  6. access test    

Command-line interface (CLI) installation and configuration

The IAM Command Line Toolkit is a Java program accessible in Amazon's AWS Developers Tools. You can utilize this apparatus to run IAM API orders from a shell utility (DOS for Windows). 

You should be running Java 1.6 or higher. You can download the most recent adaptation from Java.com. To check the rendition introduced on your Windows framework, open an order brief and type the java - adaptation. This accepts that java.exe is in your PATH. 

Download the IAM CLI tool stash and unfasten it someplace on your neighborhood drive. 

There are 2 documents in the CLI toolbox root that should be refreshed. 

AWS-credential.template: This document contains your AWS accreditations. Add AWSAccessKeyId and AWSSecretKey, save and close the record. 

client-config.template: You should refresh this document provided that you need an intermediary server. Eliminate the # sign and update ClientProxyHost, ClientProxyPort, ClientProxyUsername and ClientProxyPassword. Save and close the document. 

The following stage is to add climate factors. Go to Control Panel | System Properties | Advanced System Settings | climate variable. Add the accompanying factors:
  • AWS_IAM_HOME: Set this variable to the directory where you unzipped the CLI toolkit. If you run Windows and unzip it from the root of drive C, the variable will be C: IAMCli-1.2.0.
  • JAVA_HOMESet this variable to the directory where Java is installed. This is the location of the java.exe file. On a typical Windows 7 Java installation, C:Program Files (x86) Java is similar to jre6.
  • AWS_CREDENTIAL_FILE: Set this variable to the path and file name of the aws-credential. the template you updated above. If you run Windows and unzip it in the root of drive C, the variable will be C:IAMCli-1.2.0 aws-credential.template.
  • CLIENT_CONFIG_FILE: You should add this environment variable only if you need a proxy server. If you run Windows and unzip it from the root of drive C, the variable is C: IAMCli-1.2.0 client-config.template. Don't add this variable unless you need it
  • Test the installation by going to a command prompt and typing iam-userlistbypath. It should go as long as you don't get an error.

All IAM commands can be run from the command prompt. All commands start with "iam-".

Create a group

You can create up to 100 groups for each AWS account. You can set permissions in IAM at the user level, but it's best to use groups. The following is the process of creating a group in IAM.

  • The group creation syntax is iam-groupcreate -g GROUPNAME -p PATH -v where -p and -v are optional. Full documentation for the command line interface is available in the AWS documentation.
  • To create a group called "awesomeusers", type iam-groupcreate -g awesomeusers at the command prompt.
  • You can verify that the group was created correctly by typing iam-grouplistbypath at the command prompt. Only if you created this group will you get something like "arn:aws:iam::123456789012:group/awesomeusers". where number is your AWS account number.

Granting Group Access to S3 Bucket and CloudFront

Policies control what a group can do in S3 or CloudFront. By default, groups don't have access to anything in AWS. I found the documentation for the policies to be fine, but creating a handful of policies I did by trial and error to get them to work the way I wanted them to work.

There are several options for writing a policy. One option is that you can type directly into the command prompt. It seemed easier to add the policy to a text file and then use the iam-groupuploadpolicy command to upload the text file as a parameter, since you can also create and tweak the policy. Here is the process of using a text file and uploading it to IAM.

Use something like Notepad, type the following text and save the file.

  • {
  • "statement":{
  • "Effect": "Allow",
  • "action": "s3: *",
  • "will":
  • "arn:aws:s3:::BUCKETNAME",
  • "arn:aws:s3 :::BUCKETNAME /*"
  • },
  • {
  • "Effect": "Allow",
  • "Action": "s3:ListAllMyBuckets",
  • "resource": "arn:aws:s3:::*"
  • },
  • {
  • "Effect": "Allow",
  •  
    • "action": "cloudfront: *",
    • "will":"*"
    • }
    •  
    • }
  • This policy has three sections. This effect is used to allow or deny some types of access. Actions are specific things a group can do. Resources are used to access individual bucket
  • You can limit work individually. In this example, the groups "Action": "s3 : GetObject", "s3 : ListBucket", "s3 : GetObjectVersion" can list the contents of a bucket and download objects.
  • The first section "allows" the group to perform any S3 operation on the "bucket name" bucket.
  • The second section "allows" the group to list all buckets in S3. You can actually see the bucket list using something like the AWS Console.
  • The third section gives the group full access to CloudFront.

IAM policies have many options. Amazon has a useful tool called the AWS Policy Generator. This tool provides a GUI where you can write policies and generate the actual code needed to implement the policies. You can also check the Access Policy Languages ​​section of the Using AWS Identity and Access Management online documentation.

Create user and add to group

  • Creating a new user and adding them to a group to give them access is a two-step process. The user-generated syntax is: iam-usercreate -u USERNAME -p PATH -g GROUPS … -k -v where -p, -g, -k, and -v are optional. Full documentation for the command line interface is available in the AWS documentation.
  • To create user "bob", type iam-usercreate -u bob -g awesomeusers at the command prompt.
  • You can verify that the user is created correctly by typing iam-grouplistusers -g awesomeusers at the command prompt. If you only created this user, you will see output like "arn:aws:iam::123456789012:user/bob". where number is your AWS account number.

Create a logon profile and create a key

At this point we have created a user, but we need to provide the user with a way to actually add or remove objects in S3. There are two options you can use to give your users access to S3 using IAM. You can create a login profile and give the user a password. They can use their credentials to log into the Amazon AWS Console. Another option is to provide the user with an access key and a secret key. You can use this key in third-party tools like S3 Fox, CloudBerry S3 Explorer, or S3 Browser.

Create a login profile

When you create a login profile for your S3 users, you provide a username and password that you can use to log in to the Amazon AWS Console.

  • The syntax for creating a login profile is iam-useraddloginprofile -u USERNAME -p PASSWORD. Full documentation for the command line interface is available in the AWS documentation.
  • To create a login profile for user "bob", type iam-useraddloginprofile -u bob -p PASSWORD at the command prompt.
  • You can verify that the login profile was created correctly by typing iam-usergetloginprofile -u bob at the command prompt. If you created a login profile for bob, you will get output like "A login profile exists for your user profile".

create key

Once you have created an AWS Secret Access Key and a corresponding AWS Access Key ID, you can use third-party software such as those mentioned previously. As a security measure, keep in mind that you can only obtain the key during the user profile addition process. Copy and paste the output from the command prompt and save it to a text file. You can send files to users.

  • The syntax for adding a key for a user is iam-useraddkey -u USERNAME. Full documentation for the command line interface is available in the AWS documentation.
  • To create a key for user "bob", type iam-useraddkey -u bob at the command prompt.
  • This command will output the following keys:
    • AKIACOOB5BQVEXAMPLE
    • bidirectional
    • The first line is the access key ID and the second line is the secret key. Third-party software requires both.

access test

Now that we have created an IAM group/user and have access to the group using the policy, we need to test access.

Console access

Users can log in to the AWS Console using their username and password. However, this is not the normal console login page used for your default AWS account. You can use a special URL that provides a login form only for Amazon AWS accounts. Here is the URL to log in to S3 for IAM users.

https://AWS-ACCOUNT-NUMBER.signin.aws.amazon.com/console/s3

AWS-ACCOUNT-NUMBER is your typical AWS account number. You can get this information by logging into the Amazon Web Service login form. Log in and click Account | account activity. Your account number is in the upper right corner. Make sure you remove the dash. The URL should look something like https://123456789012.signin.aws.amazon.com/console/s3.

Use access key

You can download and install the third-party tools already mentioned in this article. Enter your access key ID and secret key according to the third-party tool documentation.

It is strongly recommended that you create an initial user and fully test that that user can do everything you need to do in S3. Once you've identified one of your users, you can set up all of your S3 users.


Monday, 11 October 2021

October 11, 2021

All about CD, HDCD and SACD Audio Disc Formats - 2021

 

All about CD, HDCD and SACD Audio Disc Formats - 2021


It was the CD that started the digital music revolution, although pre-recorded CDs have certainly lost their luster to the convenience of streaming and downloading digital music. Many people still love CDs and buy and play them regularly. Here's what you need to know about Audio CDs and their related disc-based formats.

Audio CD format

CD stands for CD. Compact disc refers to a disc and digital audio playback format developed by Philips and Sony, in which audio is digitally encoded in a pit of the disc using a process called PCM, in a manner similar to how computer data is encoded (1's and 0's). . This is a mathematical expression of music.

 

The first CD recording was made in Germany on August 17, 1982. First full CD test recording titled: Richard Strauss' Alpine Symphony. Later that year, on October 1, 1982, CD players were released in the United States and Japan. The first sold CD (Japan's first) was Billy Joel's 52nd Street previously released on vinyl in 1978.

 

CD started the digital revolution in audio, PC gaming, PC storage applications, and also contributed to the development of DVD. Sony and Philips jointly hold patents for the development of CD and CD player technology.

 

The standard CD audio format is also called "Redbook CD".

 

For more on the history of audio CDs, check out CNN.com's report.

 

Also check out photos and a full review (written by Stereophile Magazine, 1983) of the first CD player sold to the public.

 

In addition to pre-recorded audio, CDs can be used in several other applications.

  • CD-R - CD-R stands for CD-Recordable. These discs can be used to record or "burn" music or data using either a CD recorder (music only) or a PC (music or data). Some CD-Rs are dedicated to recording music while others can record both music or data. A CD-R can only be written once.
  • CD-RW - Same function as CD-R, except that the CD can be erased and reused (the RW designation is rewritable).
  • MP3-CD - An MP3 CD can be a CD-R or RW disc on which MP3 music files are written instead of standard CD audio files. This disc can be played on most CD, DVD and Blu-ray Disc players (you need to check the capabilities of your player).
  • JPEG Photo CD - A JPEG Photo CD can be a CD-R or RW disc with photos recorded in the JPEG file format. JPEG photo CDs can be played on PC and compatible CD, DVD and Blu-ray Disc players.
  • VideoCD - In addition to audio and photos, you can record video to CD. This is not the same as DVD, there is more quality between DVD and VHS formats. Video CDs cannot be played on CD players unless they have a video output connection. Although video CD players were popular in the Asian market. Video CD can be played on compatible DVD and Blu-ray Disc players.

HDCD

HDCD is a variant of the CD audio standard that extends the audio information stored in the CD signal from 4 bits (CD is based on 16-bit audio technology) to 20 bits. Encoded CDs can be played on non-HDCD CD players (non-HDCD players just ignore the extra "bits") without increasing the price of CD software. Also, as a by-product of the more fine-grained filtering circuitry of the HDCD chip, even "regular" CDs sound more complete and natural in an HDCD-equipped CD player.

HDCD was originally developed by Pacific Microsonics and later became a property of Microsoft. The first HDCD discs were released in 1995, and although they can't keep up with the Redbook CD format, more than 5,000 titles have been released (check the partial list).

When buying a music CD, look for the HDCD initials on the back or inside packaging. However, there are many releases that do not include an HDCD label, but it may be an HDCD disc. If you have a CD player with HDCD decoding, it will automatically detect your CD player and give you an added advantage.

HDCD is a high-definition compatible digital, high-definition compact digital, and high-definition compact disc.

SACD

SACD (Super Audio Compact Disc) is a high-resolution audio disc format developed by Sony and Philips (some also developed CDs). SACD uses the Direct Stream Digital (DSD) file format to reproduce sound more accurately than the Pulse Code Modulation (PCM) currently used as the CD format.

The standard CD format is tied to a 44.1 kHz sampling rate, whereas SACD is sampled at 2.8224 MHz. And with a storage capacity of 4.7 GB per disc (as much as a DVD), the SACD can accommodate 100 minutes of separate stereo and 6-channel mixes each. The SACD format also has the ability to display photographic and textual information, such as liner notes, but this feature is not integrated into most discs.

CD players cannot play SACDs, but SACD players are backwards compatible with regular CDs, and some SACD discs are dual-layer discs with PCM content that can be played on standard CD players. This means you can store both the CD version and the SACD version of the recorded content on the same disk. This means that you can invest in a dual-format SACD to play it on your current CD player and then later access the SACD content on the same disc on an SACD-compatible player.

Not all SACD discs have a standard CD layer. This means you need to check the disc label to make sure that certain SACD discs can also be played on standard CD players.

SACDs can also be played on select high-end DVD, Blu-ray and Ultra HD disc players.

SACDs are available in 2-channel or multi-channel versions. If an SACD has a CD version, the CD is always two-channel, but the SACD layer can be a two-channel or multi-channel version.

It should also be pointed out that the DSD file format coding used by SACD is being used as one of the available formats used for downloading Hi-Res audio. This provides music listeners with improved quality in a non-physical audio disc format.

SACD is also called Super Audio CD, Super Audio Compact Disc, SA-CD

 

Sunday, 10 October 2021

October 10, 2021

Remote Access Apps for iPad - 2021

 Wow! Turn your iPad into an iPhone remote monitor! It's easy now even on your own! iOS Filmic remote, how to remotely control iPhone, remote control iPad from pc Teamviewer, control iPad with iPhone without wifi.


Remote Access Apps for iPad - 2021


        Apple's iPad has changed the workplace, making it more mobile than ever before. As a result, mobile workers are looking for a way to access their office computers from this popular device. There are several apps on the market for this purpose, the best ones are highlighted here. All share security, reliability, and ease of use as key features that set it apart from the

Log Me In

      If you are already familiar with LogMeIn on your computer, using the LogMeIn remote access application will be second to you. It is a very enjoyable and intuitive tool, even for someone who has never used LogMeIn. When you log in to your LogMeIn account through the app, you will see the desktop of the remote computer and a toolbar with full functionality. From there, you can control the keyboard, command keys, and all available functions. You can also customize the controls of the tool. For example, you can choose whether the tabs on the screen are left-mouse or right-mouse clicks.

 

Go to desktop

    The Jump Desktop application promises fast and secure remote desktops compatible with RDP and VNC. A safe and reliable way to access your PC or Mac from your iPad, iPhone or iPod Touch. This application supports a split-screen on iPad and supports pencil.

 

    One of the great things about this app is that it works great with external keyboards. This is great for people who need to work on their iPad for a long time. Leave your laptop and control it using Jump Desktop from your iPad.

 

Go To My PC

        One of the main advantages of GoToMyPC is its user-friendly user interface, which translates beautifully to iPad. All you need to use this application is at the top of the screen. Just tap and you will see all the features of GoToMyPC. Like the desktop version, the iPad app has screen blanking, remote printing, and the ability to transfer files between devices. It is a secure app with different authentication levels to ensure that only authenticated users can log in.

 

Personal Splashtop

        Splashtop Personal is a much faster and more intuitive remote access app. Just click, tap-and-drag, drag-and-drop, and the controls will appear exactly as you expect them to. Getting an on-screen keyboard is as easy as clicking a button at the bottom of the iPad screen. So you don't have to spend time searching for your keyboard in the app. It's not quite as feature-rich as LogMeIn, but it's a useful tool for basic remote access on the iPad.

 

Team Viewer

 

         Just like your desktop, iPad applications are behind a firewall, allowing you to remotely and securely access your office computer. It also offers many features that go beyond basic remote access. One of the main benefits of the Teamviewer application is that it includes online collaboration capabilities, so you can not only access your office computer from anywhere but also work with your team as if you were in the office. The app stands out because it is free for personal use.



Saturday, 9 October 2021

October 09, 2021

Computer Security Tips: Blocking, Viruses, Malware – 2021

Computer Security Tips: Blocking, Viruses, Malware – 2021




      

      Good computer security can seem like a daunting task(seeming difficult to deal with in prospect) Fortunately, you can have good security measures in a very short time by following a few simple steps outlined below.


1)    Use antivirus software and keep it up to dateCheck for new definition updates daily. Most antivirus software can be configured to do this automatically.

2)    best antivirus software

3)    best spyware scanner


 2) Install security patches .

 Vulnerabilities in our software are constantly being discovered and we do not discriminate by vendor or platform. It's not just a Windows update issue. At least monthly, check for and apply updates to all the software you use.

  • For Windows updates, visit the Microsoft Update Catalog.
  • For all other updates, use Secunia Software Inspector.

3) Use a firewall.

 Without an internet connection, your internet connection is not secure. There are moments when computers without firewalls are infected.  Operating systems come with a built-in firewall.

  4)  Beware of sharing too much information      

       Also, beware of sharing too much information on social media. For example, why do you have to provide your mother's maiden name or address? Identity thieves and other criminals use social media accounts to access information.

5) Control your email. 

            Do not open email attachments that you suddenly receive, no matter who the email attachment is from. Most worms and Trojan spams try to spoof spam. And be careful not to infect your email client. Reading e-mail in plain text provides a significant security advantage over offsetting the loss of important color.

  • Why plain (text) is better
  • Email Security Methods

6) Treat IM suspiciously. 

        Instant messaging is a target for worms and Trojans. Treat it like e-mail.

  • Tips for Messenger Safety

 

7) Use strong passwords. 

          Use a variety of letters, numbers, and special characters. The longer and more complex, the better. Use a different password for each account. Use two-factor authentication if your account supports it. Of course, managing all your passwords can be complicated, so consider using a password manager application. This type of app often acts as a browser plugin that monitors password entry and stores credentials for each account. All you really need to memorize is a single password for the admin program.

8) Stay tuned. Internet fraud.

           Criminals think of clever ways to separate you from your hard-earned cash. Don't be fooled by sad emails, unsolicited job advertisements or promising lottery wins. Likewise, beware of emails masquerading as security concerns for your bank or other e-commerce sites.

9) Avoid becoming a victim of virus scams. 

           Emails that spread fear, uncertainty, and doubts about non-existent threats only serve to spread unnecessary alerts, and may even delete perfectly legitimate files in response.