AWS CloudFormation Input parameters

Input parameters enable us to configure options related to cloudformation stack. Similar to reoursces, they are defined at the root of the template within parameters section. At runtime, you’ll be prompted to povide a value for each parameter; however you still can set a default value.

CloudFormation Mappings in a NutShell

One of the cloudformation features that is particularly useful is mapping, which used to determine which in put value pertains to another value, For instance, since AMI IDs are

CloudFormation Pseudo Parameters Explained

CloudFormation provides predefined values called pseudo parameters, so you can skip declaring them in your template. They are analogous to the system environment. The Ref intrinsic function is used to refer to pseudo parameters. Consider the following example:

Ambiguity effect

The ambiguity effect is demonstrated by the fact that most people would prefer a steady

SurvivorShip Bias: background and examples

Fighter aircrafts returning after missions during World War II are often cited as an early and well-known example of survivorship bias. The military planned to fortify the plane by installing armour there. Armour, however, would be too heavy to be placed everywhere.

Create User using Laravel Tinker

Tinker is a Laravel intractive command line shell and scripting interface. Tinker core includes many helpful commands and generators; we’ll utilise Tinker to create a user in Laravel.

Work with PMD for Apex in VS code

In this article, we’ll go over installing PMD and the PMD plugin for visual studio code, as well as adding some custom rulesets and finaly addressing some common issues.

Add alias permanently to MacOS

Writing out lengthy commands (like database) every time you use them can be a pain. Here, the alias command, which shortens lengthy commands to just a single word, comes in handy. For instance, in Salesforce, to open a specific organisation in the browser, we use the following command:

Man in the middle attack in brief

A man-in-the-middle attack refers to a type of cyber attack where an unauthorised third party intercepts a communication channel that is perceived to be secure by the two legitimate parties involved in the communication.

How HTTPs works

HTTPS runs on transport layer of TLS on port 443. The predecessor of TLS was SSL, which deprecated.

  1. TLS handshake issued by the client, let’s call the message ‘chello’ for simplicity.