Log4Shell (CVE-2021-44228) was not just another vulnerability—it was a paradigm shift. A single user-controlled string in a log message could trigger Remote Code Execution (RCE) on any Java application using Log4j 2.x. The root cause was not a bug but a dangerous design feature: JNDI lookups in log message formatting. In this comprehensive guide, I […]
Read more →Search Results for: name
2022 Predictions: The Year of AI-Assisted Development
As we enter 2022, the technology landscape is undergoing a seismic transformation. The convergence of artificial intelligence with software development tools, the aftermath of Log4Shell reshaping security priorities, and the commoditization of Kubernetes through managed abstractions are defining themes that will shape enterprise architecture decisions for years to come. In this comprehensive analysis, I will […]
Read more →Blazor in .NET 6: Dynamic Components
.NET 6 Blazor introduces “, allowing you to render a component whose type is selected at runtime. No more massive switch statements in render trees. Usage Use Cases Plugin systems where component types are registered dynamically. Dashboard builders with user-selectable widgets. Key Takeaways Combine with `System.Reflection` to load components by name. Parameters must be passed […]
Read more →Azure Bicep: Private Registry Support
Bicep modules can now be published to a **Private Azure Container Registry (ACR)**, enabling enterprise-scale sharing and versioning of infrastructure templates. Publishing a Module Consuming from Registry Key Takeaways Versioning (`v1.0`) enables safe rollouts and rollbacks. Authenticate using `az login` or a Service Principal in CI/CD.
Read more →Securing Microservices: mTLS in Kubernetes
Zero Trust mandates that internal traffic be encrypted and authenticated. **mTLS (mutual TLS)** achieves this by requiring both client and server to present certificates. In Kubernetes, Service Meshes like Istio automate this entirely. How Istio Handles mTLS Enabling Strict Mode Key Takeaways Certificate rotation is automatic (usually 24 hours). Use AuthorizationPolicies to control which services […]
Read more →Azure AD B2C: Custom Policies
User Flows are easy but limited. Custom Policies (Identity Experience Framework) are XML-based beasts that unlock full control. REST API Integration We use a Custom Policy to call a REST API during sign-up to validate a loyalty number. This runs before the user accounts is created in the directory.
Read more →