<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on Teddy Ferdinand</title><link>https://tferdinand.net/en/posts/</link><description>Recent content in Posts on Teddy Ferdinand</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Wed, 29 Apr 2026 13:19:30 +0000</lastBuildDate><atom:link href="https://tferdinand.net/en/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Why `curl | bash` is a dangerous bad habit</title><link>https://tferdinand.net/en/why-curl-bash-is-a-dangerous-bad-habit/</link><pubDate>Wed, 29 Apr 2026 09:42:21 +0000</pubDate><guid>https://tferdinand.net/en/why-curl-bash-is-a-dangerous-bad-habit/</guid><description>&lt;p&gt;Recently, I stumbled again upon an old bad habit from the Linux/DevOps/Cloud world: installing a tool with a command like:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-fallback" data-lang="fallback"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;curl -sSL https://example.com/install.sh | bash
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Or worse:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-fallback" data-lang="fallback"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;curl -sSL https://example.com/install.sh | sudo bash
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;We have all seen it before.&lt;br&gt;
We have probably all used it at some point.&lt;/p&gt;
&lt;p&gt;And let’s be honest for a minute: in many official documentations, this is still presented as the “simple” way to install a tool.&lt;/p&gt;</description></item><item><title>Attack techniques: understanding ARP poisoning</title><link>https://tferdinand.net/en/attack-techniques-understanding-arp-poisoning/</link><pubDate>Fri, 21 Oct 2022 05:37:16 +0000</pubDate><guid>https://tferdinand.net/en/attack-techniques-understanding-arp-poisoning/</guid><description>&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;As often on this kind of post, I would like to remind you that the content you will find here is for educational purposes only.&lt;/p&gt;
&lt;p&gt;Unauthorized intrusion in an information system is punishable by fine and/or imprisonment.&lt;/p&gt;
&lt;p&gt;Understanding attacks means knowing how to avoid them. In this post, I propose you see a common network attack model: ARP poisoning.&lt;/p&gt;
&lt;h2 id="what-is-arp"&gt;What is ARP?&lt;/h2&gt;
&lt;p&gt;To understand the attack, we must already understand what it is based on.&lt;/p&gt;</description></item><item><title>Log4j from the eye of the storm</title><link>https://tferdinand.net/en/log4j-from-the-eye-of-the-storm/</link><pubDate>Mon, 20 Dec 2021 20:37:40 +0000</pubDate><guid>https://tferdinand.net/en/log4j-from-the-eye-of-the-storm/</guid><description>&lt;p&gt;Unless you live in a cave, you couldn’t miss the last few days the &lt;a href="https://logging.apache.org/log4j/2.x/security.html"&gt;flaws discovered on the Java log4j library&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;I’m not going to make another post talk about this flaw, but rather to talk about my experience in the field on the impact of this flaw at the operational level.&lt;/p&gt;
&lt;h2 id="the-importance-of-having-an-up-to-date-inventory"&gt;The importance of having an up-to-date inventory&lt;/h2&gt;
&lt;p&gt;I talked about this on Twitter (in French), but for me, this flaw highlights the fact that many companies lack an up-to-date inventory of their resources.&lt;/p&gt;</description></item><item><title>OpenSource Traefik ratings with Matomo</title><link>https://tferdinand.net/en/opensource-traefik-ratings-with-matomo/</link><pubDate>Mon, 15 Feb 2021 07:34:00 +0000</pubDate><guid>https://tferdinand.net/en/opensource-traefik-ratings-with-matomo/</guid><description>&lt;p&gt;Some time ago, I talked to you about tracking and &lt;a href="https://tferdinand.net/why-do-i-care-about-my-personal-data/"&gt;why I care about my privacy&lt;/a&gt;. In my conclusion, I indicated that user tracking was still a useful tool for a company, as long as it was ethical and respectful of users.&lt;/p&gt;
&lt;p&gt;However, very often, I see that Google Analytics is used by the sites I browse on. It is far (even very far) from being respectful of your users&amp;rsquo; data. Even worse! You allow Google to know the activity of your site from end to end and to know how to better target its ads (among others).&lt;/p&gt;</description></item><item><title>[IT] Salary is not the only recruitment criteria</title><link>https://tferdinand.net/en/it-salary-is-not-the-only-recruitment-criteria/</link><pubDate>Mon, 08 Feb 2021 07:07:00 +0000</pubDate><guid>https://tferdinand.net/en/it-salary-is-not-the-only-recruitment-criteria/</guid><description>&lt;p&gt;Because of my professional background, I’ve worked for a lot of companies, either as a service provider or internally.&lt;/p&gt;
&lt;p&gt;Salary is often:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A taboo subject, you should not talk about the salary you receive and even less with your colleagues&lt;/li&gt;
&lt;li&gt;Seen as the only criterion for recruiting: If we don’t recruit, it’s because we don’t pay enough, if employees leave, it’s because of the salary&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Today, I give you my vision on this point.&lt;/p&gt;</description></item><item><title>For an effective security posture</title><link>https://tferdinand.net/en/for-an-effective-security-posture/</link><pubDate>Mon, 01 Feb 2021 06:57:00 +0000</pubDate><guid>https://tferdinand.net/en/for-an-effective-security-posture/</guid><description>&lt;p&gt;I’ve been working in the IT field for more than 10 years now and I’ve worked with a lot of “security” teams within the companies I’ve been in. I’ve been a security guy (Cloud Security Architect) for a little over a year now.&lt;/p&gt;
&lt;p&gt;During these years, I often noticed a blocking posture of the security teams, sometimes even disconnected from the field, leading to slowdowns and tensions in the projects.&lt;/p&gt;</description></item><item><title>The danger of Grey IT in companies</title><link>https://tferdinand.net/en/the-danger-of-grey-it-in-companies/</link><pubDate>Mon, 18 Jan 2021 07:48:00 +0000</pubDate><guid>https://tferdinand.net/en/the-danger-of-grey-it-in-companies/</guid><description>&lt;p&gt;Confined spaces have changed our work habits a lot. Telecommuting has become something more common than it was just a year ago.&lt;/p&gt;
&lt;p&gt;With the implementation of telecommuting very quickly, new risks have appeared. Today, I suggest talking about Grey IT.&lt;/p&gt;
&lt;h2 id="what-is-grey-it"&gt;What is Grey IT?&lt;/h2&gt;
&lt;p&gt;In a company, in a classical way, the applications used are referenced in a service catalog.&lt;/p&gt;
&lt;p&gt;For example, if your company uses Slack, the office service knows it, and will configure this application so that it works with the company’s security and confidentiality standards.&lt;/p&gt;</description></item><item><title>Create Vagrant boxes easily using Packer</title><link>https://tferdinand.net/en/create-vagrant-boxes-easily-using-packer/</link><pubDate>Mon, 11 Jan 2021 06:42:00 +0000</pubDate><guid>https://tferdinand.net/en/create-vagrant-boxes-easily-using-packer/</guid><description>&lt;p&gt;A few months ago, I wrote a post to explain how to easily create a local Kubernetes cluster leveraging Vagrant and Traefik. You can find it here:&lt;/p&gt;






&lt;a class="bookmark-card" href="https://tferdinand.net/create-a-local-kubernetes-cluster-with-vagrant/" target="_blank" rel="noopener noreferrer"&gt;
 
 &lt;div class="bookmark-card__image"&gt;
 &lt;img src="bookmark-en-1.jpg" alt=""&gt;
 &lt;/div&gt;
 

 &lt;div class="bookmark-card__content"&gt;
 &lt;div class="bookmark-card__title"&gt;Create a local Kubernetes cluster with Vagrant&lt;/div&gt;

 
 &lt;div class="bookmark-card__description"&gt;Testing Kubernetes is quite easy thanks to solutions such as Minikube. However, when you want to test cluster-specific features, such as load balancing or failover, it is not necessarily suitable anymore. It is possible to build your Kubernetes infrastructure on servers, or by using managed services…&lt;/div&gt;
 

 &lt;div class="bookmark-card__meta"&gt;
 
 Teddy FERDINAND
 
 &lt;/div&gt;
 &lt;/div&gt;
&lt;/a&gt;
&lt;p&gt;Today, I suggest to see how we can accelerate this creation by building ourselves the box used by Vagrant, preconfigured with our tools. This post is the continuation of the one above. Some notions will not be discussed again.&lt;/p&gt;</description></item><item><title>Cyberpunk 2077: Analysis of an agile method failure</title><link>https://tferdinand.net/en/cyberpunk-2077-analysis-of-an-agile-method-failure/</link><pubDate>Thu, 24 Dec 2020 06:20:00 +0000</pubDate><guid>https://tferdinand.net/en/cyberpunk-2077-analysis-of-an-agile-method-failure/</guid><description>&lt;p&gt;On December 10th, one of the most anticipated games of the year was released: Cyberpunk 2077.&lt;/p&gt;
&lt;p&gt;Personally, I enjoy playing it, but it’s not the case for everyone.&lt;/p&gt;
&lt;p&gt;With an outside look of an IT professional, I suggest you see today the “mistakes” that I think were made in this project, and how some mistakes could have been avoided. This article is not about the game itself, but rather about the organizational and technical aspects.&lt;/p&gt;</description></item><item><title>Test your antivirus with a cryptolocker (mastered)</title><link>https://tferdinand.net/en/test-your-antivirus-with-a-cryptolocker-mastered/</link><pubDate>Fri, 04 Dec 2020 06:00:00 +0000</pubDate><guid>https://tferdinand.net/en/test-your-antivirus-with-a-cryptolocker-mastered/</guid><description>&lt;p&gt;Computer attack patterns have evolved in recent years. Cryptolockers have become the spearhead of many hackers.&lt;/p&gt;
&lt;p&gt;Does your antivirus vendor promise you that you are protected against these new threats? OK, prove it before you get stuck by a real attack.&lt;/p&gt;
&lt;h2 id="lets-talk-about-cryptolocker"&gt;Let’s talk about cryptolocker&lt;/h2&gt;
&lt;p&gt;The principle of a cryptolocker is quite simple: encrypt target files (often.doc, .txt, . odt, etc.) and then demand a ransom. A ransomware has nothing to gain by destroying the underlying OS, so system files are rarely touched.&lt;/p&gt;</description></item><item><title>Turn off the Internet: AWS is no longer responding!</title><link>https://tferdinand.net/en/turn-off-the-internet-aws-is-no-longer-responding/</link><pubDate>Mon, 30 Nov 2020 17:53:04 +0000</pubDate><guid>https://tferdinand.net/en/turn-off-the-internet-aws-is-no-longer-responding/</guid><description>&lt;p&gt;A few days ago, an incident impacting the AWS cloud provider had a significant impact on many companies and services directly affected by this instability.&lt;/p&gt;
&lt;p&gt;I saw on social networks many reactions, often beside the subject (unfortunately) and I thought it could be useful to give you my analysis of the subject.&lt;/p&gt;
&lt;h2 id="rewind"&gt;Rewind&lt;/h2&gt;
&lt;p&gt;Let’s start by recalling the incident a bit.&lt;/p&gt;
&lt;p&gt;On Wednesday evening (French time), AWS encountered a growing number of errors in some of its services in the us-east-1 (North Virginia) region.&lt;/p&gt;</description></item><item><title>Create a local Kubernetes cluster with Vagrant</title><link>https://tferdinand.net/en/create-a-local-kubernetes-cluster-with-vagrant/</link><pubDate>Tue, 15 Sep 2020 07:00:57 +0000</pubDate><guid>https://tferdinand.net/en/create-a-local-kubernetes-cluster-with-vagrant/</guid><description>&lt;p&gt;Testing Kubernetes is quite easy thanks to solutions such as Minikube.&lt;/p&gt;
&lt;p&gt;However, when you want to test cluster-specific features, such as load balancing or failover, it is not necessarily suitable anymore.&lt;/p&gt;
&lt;p&gt;It is possible to build your Kubernetes infrastructure on servers, or by using managed services from a cloud provider (Kapsule at Scaleway, AKS at Azure, GKE at GCP or EKS at AWS for example).&lt;/p&gt;
&lt;p&gt;Nevertheless, these solutions cost money. When you just want to test functionalities or self-training, it&amp;rsquo;s not necessarily appropriate.&lt;/p&gt;</description></item><item><title>Being a hacker isn't like being in the movies!</title><link>https://tferdinand.net/en/being-a-hacker-isnt-like-being-in-the-movies/</link><pubDate>Sun, 23 Aug 2020 18:19:46 +0000</pubDate><guid>https://tferdinand.net/en/being-a-hacker-isnt-like-being-in-the-movies/</guid><description>&lt;p&gt;Hackers … we often see them in movies and TV shows. These experts are able to hijack NSA satellites with a string and a nail clipper (#MacGyver)! (Cover image from the movie Die hard 4)&lt;/p&gt;
&lt;p&gt;I decided today to tell you about hacking in &amp;ldquo;real life&amp;rdquo;. I consider myself to be a white hat (an ethical hacker) and I’m going to tell you about the common methods a hacker uses. I will focus here on the simplest part: websites.&lt;/p&gt;</description></item><item><title>AWS IAM: Between dream and nightmare</title><link>https://tferdinand.net/en/aws-iam-between-dream-and-nightmare/</link><pubDate>Sun, 16 Aug 2020 04:51:07 +0000</pubDate><guid>https://tferdinand.net/en/aws-iam-between-dream-and-nightmare/</guid><description>&lt;p&gt;I have been using AWS professionally for over 4 years now.&lt;/p&gt;
&lt;p&gt;To be a bit old-fashioned, when I started on AWS, the following services and features did not exist:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The ALB/NLB&lt;/li&gt;
&lt;li&gt;ACM&lt;/li&gt;
&lt;li&gt;ElasticSearch Service&lt;/li&gt;
&lt;li&gt;Lambda inside a VPC or with the duration of more than 5 minutes&lt;/li&gt;
&lt;li&gt;ECS/EKS/ECR&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;During these 4 years, I had the opportunity to do a lot of IAM, essential to deploy secure solutions on Amazon.&lt;/p&gt;
&lt;h2 id="iam-and-least-privilege"&gt;IAM and least privilege&lt;/h2&gt;
&lt;p&gt;Identity and Access Management (IAM) is the AWS service that defines users or roles and their associated permissions.&lt;/p&gt;</description></item><item><title>Traefik 2.3 + ECS + Fargate : Reverse proxy serverless in AWS</title><link>https://tferdinand.net/en/traefik-2-3-ecs-fargate-reverse-proxy-serverless-in-aws/</link><pubDate>Wed, 29 Jul 2020 15:45:30 +0000</pubDate><guid>https://tferdinand.net/en/traefik-2-3-ecs-fargate-reverse-proxy-serverless-in-aws/</guid><description>&lt;p&gt;Traefik is a reverse proxy that we have &lt;a href="https://tferdinand.net/tag/traefik/"&gt;already mentioned on this blog in the past&lt;/a&gt;. Very powerful coupled with containers, it allows a fine and light management of traffic.&lt;/p&gt;
&lt;p&gt;A few days ago, Containous, the editor of Traefik, &lt;a href="https://community.containo.us/t/traefik-realease-v2-3-0-rc2/6942"&gt;announced the release of Traefik 2.3.0-rc2&lt;/a&gt;. This new version brings some changes, including :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The addition of a new service: Traefik Pilot.&lt;/li&gt;
&lt;li&gt;The ability to add plugins to Traefik&lt;/li&gt;
&lt;li&gt;The addition of the ECS provider&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I have already covered the first two points on this blog and I will focus here on the support of the ECS (Elastic Container Service) backend on AWS via a new Traefik provider.&lt;/p&gt;</description></item><item><title>Traefik 2.3 : Towards plugins and beyond!</title><link>https://tferdinand.net/en/traefik-2-3-towards-plugins-and-beyond/</link><pubDate>Thu, 23 Jul 2020 06:38:07 +0000</pubDate><guid>https://tferdinand.net/en/traefik-2-3-towards-plugins-and-beyond/</guid><description>&lt;p&gt;Traefik 2.3 (codename: Picodon - picodon is a cheese, which you can see in the banner of this article) is available as a release candidate since a few days. More than a simple version increment, it brings a lot of new features.&lt;/p&gt;
&lt;p&gt;Two big new features caught my attention:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The new service of Traefik : Traefik Pilot&lt;/li&gt;
&lt;li&gt;Adding plugin management&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Another new feature, compatibility with ECS will be covered in a future article.&lt;/p&gt;</description></item><item><title>Why and how I got rid of Disqus</title><link>https://tferdinand.net/en/why-and-how-i-got-rid-of-disqus/</link><pubDate>Mon, 20 Jul 2020 08:00:00 +0000</pubDate><guid>https://tferdinand.net/en/why-and-how-i-got-rid-of-disqus/</guid><description>&lt;p&gt;Lately, I&amp;rsquo;ve made some changes to this blog, discreetly. One of the main changes is the management of comments, goodbye Disqus, hello Commento. I&amp;rsquo;ll explain why&amp;hellip;&lt;/p&gt;
&lt;h2 id="a-bit-of-history-of-this-blog"&gt;A bit of history of this blog&lt;/h2&gt;
&lt;p&gt;At the beginning (I&amp;rsquo;m talking about February 2019, not old times) of this blog, my goal was rather simplistic: I wanted to share my knowledge, my vision on certain subjects and talk about anecdotes of all kinds. A year and a half and forty posts later, goal achieved!&lt;/p&gt;</description></item><item><title>What the Twitter hack teaches us (or reminds us of)</title><link>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</link><pubDate>Fri, 17 Jul 2020 22:00:00 +0000</pubDate><guid>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</guid><description>&lt;p&gt;A few days ago, Twitter was the target of a hack inviting, via &amp;ldquo;verified accounts&amp;rdquo;, users to send BitCoins to receive double the amount. I suggest a small post on what we can learn from this attack, from a computer security point of view.&lt;/p&gt;
&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;The purpose of this article is not to make an umpteenth analysis of this attack, but rather to recall some basic rules of computer security that this attack reminds me of.&lt;/p&gt;</description></item><item><title>"We need to recruit women in IT."</title><link>https://tferdinand.net/en/we-need-to-recruit-women-in-it/</link><pubDate>Fri, 17 Jul 2020 19:45:09 +0000</pubDate><guid>https://tferdinand.net/en/we-need-to-recruit-women-in-it/</guid><description>&lt;p&gt;I see and hear regularly that &amp;ldquo;we need to recruit more women in IT&amp;rdquo;. However, there is a lot behind this sentence.&lt;/p&gt;
&lt;p&gt;In this post, I will give you my opinion on the presence of women in IT jobs.&lt;/p&gt;
&lt;h2 id="false-preconceptions"&gt;False preconceptions&lt;/h2&gt;
&lt;p&gt;For several decades now, we have been repeating over and over again that IT is a man&amp;rsquo;s world, we repeat it so much that we end up believing it&amp;rsquo;s real&amp;hellip;&lt;/p&gt;</description></item><item><title>Is teleworking (really) the answer?</title><link>https://tferdinand.net/en/is-teleworking-really-the-answer/</link><pubDate>Wed, 08 Jul 2020 20:00:00 +0000</pubDate><guid>https://tferdinand.net/en/is-teleworking-really-the-answer/</guid><description>&lt;p&gt;Since the beginning of containment (in France, 2020/03), telework has become the norm for many, including myself, however, the return to the office is looming, and I can already hear the first discontents about it. A short post about my point of view.&lt;/p&gt;
&lt;h2 id="lets-talk-about-covid"&gt;Let&amp;rsquo;s talk about CoVid&lt;/h2&gt;
&lt;p&gt;With the spread of CoVid and containment, teleworking has become mandatory for many companies so that they are not forced to close down. Some companies even boasted that they were in the business of teleworking the most when 2 months earlier they were struggling to allow 2 to 3 days in a month&amp;hellip; but nevermind.&lt;/p&gt;</description></item><item><title>Turn your AWS DevSecOps Pipeline into bunker - Part 1</title><link>https://tferdinand.net/en/turn-your-aws-devsecops-pipeline-into-bunker-part-1/</link><pubDate>Thu, 18 Jun 2020 20:02:35 +0000</pubDate><guid>https://tferdinand.net/en/turn-your-aws-devsecops-pipeline-into-bunker-part-1/</guid><description>&lt;blockquote&gt;
&lt;p&gt;This post was co-authored by &lt;a href="https://zoph.me/"&gt;Victor Grenu&lt;/a&gt;. Who is working as Cloud Architect&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this series, we will talk about the emergence of the DevSecOps movement, and more especially, what are the benefits of introducing a DevSecOps approach on your existing CI/CD Pipelines.&lt;/p&gt;
&lt;h2 id="cicd-pipeline"&gt;CI/CD Pipeline&lt;/h2&gt;
&lt;p&gt;To give you some context, you will find in the diagram below a standard CI/CD Pipeline.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://i.imgur.com/EMznwrL.png" alt=""&gt;&lt;/p&gt;
&lt;h2 id="devsecwhat"&gt;DevSecWhat?&lt;/h2&gt;
&lt;p&gt;DevSecOps could be defined as a shift from a central internal security team to the inclusion of security practices into the existing DevOps teams: DevSecOps&lt;/p&gt;</description></item><item><title>My teleworking setup</title><link>https://tferdinand.net/en/my-teleworking-setup/</link><pubDate>Thu, 11 Jun 2020 20:18:00 +0000</pubDate><guid>https://tferdinand.net/en/my-teleworking-setup/</guid><description>&lt;p&gt;Like many, I&amp;rsquo;ve been &amp;ldquo;forced&amp;rdquo; to telework for several weeks. Long before CoVid, I already regularly teleworked and I had invested some time (and money) to have a setup that allowed me to work as well as possible from home. A little overview&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The Amazon links you&amp;rsquo;ll find below are not sponsored, and are simply put as a reference.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id="my-need"&gt;My need&lt;/h2&gt;
&lt;p&gt;I have a desk with a personal computer, I have two screens, a keyboard and a good mouse. My goal is to be able to use this equipment on my own and my client&amp;rsquo;s PC.&lt;/p&gt;</description></item><item><title>The difficulty of antibot fight on the web</title><link>https://tferdinand.net/en/the-difficulty-of-antibot-fight-on-the-web/</link><pubDate>Wed, 03 Jun 2020 06:36:01 +0000</pubDate><guid>https://tferdinand.net/en/the-difficulty-of-antibot-fight-on-the-web/</guid><description>&lt;p&gt;Robots, more commonly known as bots, are now plentiful on the Internet. They account for a significant share of global Internet traffic.&lt;/p&gt;
&lt;p&gt;Today, I propose you to discover the world of Internet bots.&lt;/p&gt;
&lt;h2 id="bots-but-what-for"&gt;Bots&amp;hellip; but what for?&lt;/h2&gt;
&lt;p&gt;The first question one might ask would be why bots are roaming freely on the Internet.&lt;/p&gt;
&lt;p&gt;You use, sometimes unknowingly, bots every day when you surf the Internet. You have run a search on a search engine, a bot has indexed it before for you. A large part of the messages from companies on social networks come from bots that publish them in their name.&lt;/p&gt;</description></item><item><title>Why do I care about my personal data</title><link>https://tferdinand.net/en/why-do-i-care-about-my-personal-data/</link><pubDate>Mon, 25 May 2020 11:41:51 +0000</pubDate><guid>https://tferdinand.net/en/why-do-i-care-about-my-personal-data/</guid><description>&lt;p&gt;I&amp;rsquo;ve been in IT long enough to know the value of personal data. It&amp;rsquo;s very valuable data for companies, allowing them to target their audience ever more effectively.&lt;/p&gt;
&lt;p&gt;I worked for 3 years for Médiamétrie which, in France, carries out studies and surveys for companies as well as most of the audience measurements for TV channels and radios.&lt;/p&gt;
&lt;p&gt;What often comes out of the studies is the same thing, what is interesting is not the mass, it&amp;rsquo;s the CSP (socio-professional category). Knowing that TF1 had an audience of 12% the day before is a piece of information, knowing that &amp;ldquo;people in charge of purchasing&amp;rdquo; (from memory, commercial name for &amp;ldquo;housewife/man&amp;rdquo;) aged 30 to 40 years old represented 26% of the market share is much more valuable.&lt;/p&gt;</description></item><item><title>Accelerate the test of your lambda functions with Docker</title><link>https://tferdinand.net/en/accelerate-the-test-of-your-lambda-functions-with-docker/</link><pubDate>Mon, 27 Apr 2020 06:00:00 +0000</pubDate><guid>https://tferdinand.net/en/accelerate-the-test-of-your-lambda-functions-with-docker/</guid><description>&lt;p&gt;Lambda is a very powerful AWS tool. Executing scripts in serverless mode drastically reduces the cost and complexity of managing a scalable infrastructure, however, testing its functions directly on Lambda can sometimes be frustrating as it requires round trips between the development station and the AWS environment.&lt;/p&gt;
&lt;p&gt;There are testing features built into the AWS toolkit for the most popular editors (&lt;a href="https://aws.amazon.com/visualstudiocode/"&gt;for Microsoft Visual Studio Code&lt;/a&gt; / &lt;a href="https://aws.amazon.com/pycharm/"&gt;PyCharm&lt;/a&gt;, for example), however, this restricts the possible editors and creates an adherence that is not particularly desirable.&lt;/p&gt;</description></item><item><title>What are the differences between end-to-end encryption and encryption in transit?</title><link>https://tferdinand.net/en/what-are-the-differences-between-end-to-end-encryption-and-encryption-in-transit/</link><pubDate>Mon, 20 Apr 2020 15:34:51 +0000</pubDate><guid>https://tferdinand.net/en/what-are-the-differences-between-end-to-end-encryption-and-encryption-in-transit/</guid><description>&lt;p&gt;With the coronavirus crisis, the use of external technologies is necessary.&lt;/p&gt;
&lt;p&gt;For this post, I will talk (among others) about Zoom, the trendy application for video conferencing that plays on the terms for securing their solution.&lt;/p&gt;
&lt;h2 id="encrypting-exchanges-why"&gt;Encrypting exchanges, why?&lt;/h2&gt;
&lt;p&gt;Why do we do encryption? There can be many reasons, the most obvious is to avoid data interception.&lt;/p&gt;
&lt;p&gt;In the case of an encrypted exchange, even if my data stream were intercepted, the impact would be nil, since the attacker would be unable to read this stream, assuming of course that I have set up a strong enough encryption.&lt;/p&gt;</description></item><item><title>Automatically deploy your Ghost themes with CircleCI</title><link>https://tferdinand.net/en/automatically-deploy-your-ghost-themes-with-circleci/</link><pubDate>Tue, 07 Apr 2020 07:26:59 +0000</pubDate><guid>https://tferdinand.net/en/automatically-deploy-your-ghost-themes-with-circleci/</guid><description>&lt;p&gt;As you can see, this site uses the Ghost CMS. Moreover, I use a theme that I modify from time to time according to my needs, as for example to add the multi-author that was not active natively.&lt;/p&gt;
&lt;p&gt;Nevertheless, the default is that Ghost requires each time to redeploy the theme via the backoffice. It must also be compressed with a unique name each time.&lt;/p&gt;
&lt;p&gt;Nothing too much blocking, except that when working on some improvements, the back and forth for tests can be numerous.&lt;/p&gt;</description></item><item><title>Traefik 2 - Reverse proxy in Kubernetes</title><link>https://tferdinand.net/en/traefik-2-reverse-proxy-in-kubernetes/</link><pubDate>Wed, 01 Apr 2020 20:01:29 +0000</pubDate><guid>https://tferdinand.net/en/traefik-2-reverse-proxy-in-kubernetes/</guid><description>&lt;p&gt;Today, we deploy more and more applications and micro-services in Kubernetes. Managing all the entry points of these applications can be problematic. To facilitate this management, there are ingress controllers, Traefik is one of them.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Disclaimer :&lt;/strong&gt; This post is a translated version of the blog post I made for my company, you can find the french version &lt;a href="https://blog.wescale.fr/2020/03/06/traefik-2-reverse-proxy-dans-kubernetes/"&gt;here&lt;/a&gt;, on WeScale blog.&lt;/p&gt;
&lt;h2 id="traefik-2---one-ingress-controller-to-control-them-all"&gt;Traefik 2 - One ingress controller to control them all&lt;/h2&gt;
&lt;p&gt;Pourquoi utiliser Traefik ?&lt;/p&gt;</description></item><item><title>I got phished, but its for science!</title><link>https://tferdinand.net/en/got-phished-but-its-for-science/</link><pubDate>Mon, 30 Mar 2020 05:00:00 +0000</pubDate><guid>https://tferdinand.net/en/got-phished-but-its-for-science/</guid><description>&lt;p&gt;We often hear about scam, phising.&lt;/p&gt;
&lt;p&gt;Today, I have a special note for you: I was deliberately phished to show you the other side of the world!&lt;/p&gt;
&lt;h2 id="point-very-important"&gt;Point VERY important!&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The manipulations that you will see below (and in particular the fact of voluntarily going on a phishing site) can be dangerous for your system and/or your personal data. They have been made in a sandbox environment and must not be reproduced without prior protection.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Containment: Danger to SI</title><link>https://tferdinand.net/en/containment-danger-to-si/</link><pubDate>Mon, 23 Mar 2020 07:49:00 +0000</pubDate><guid>https://tferdinand.net/en/containment-danger-to-si/</guid><description>&lt;p&gt;For a week now, many of us have been housebound. Telework has been the weapon that many companies have drawn to keep their business going, so many do not understand why some companies that used to do little or no telework are now able to operate full telework. Similarly, some do not understand that even in the IT field, there are still people who have to work on-site. A brief overview&amp;hellip;&lt;/p&gt;</description></item><item><title>I tested for you: Raspberry Pi imager</title><link>https://tferdinand.net/en/i-tested-for-you-raspberry-pi-imager/</link><pubDate>Tue, 10 Mar 2020 09:08:00 +0000</pubDate><guid>https://tferdinand.net/en/i-tested-for-you-raspberry-pi-imager/</guid><description>&lt;p&gt;A few days ago, the Raspberry Pi foundation announced the release of a new utility to deploy its OS on its Raspberry.&lt;/p&gt;
&lt;p&gt;Having 2 Raspberries to reinstall, I thought I would test it for you. A little overview.&lt;/p&gt;
&lt;h2 id="user-friendly-installation"&gt;User friendly installation&lt;/h2&gt;
&lt;p&gt;As I was talking about last week, one of the challenges of Linux is to make it more accessible to non-technical users.&lt;/p&gt;
&lt;p&gt;This utility is particularly aimed at this type of user, since the installation is very simple compared to the existing alternatives.&lt;/p&gt;</description></item><item><title>All operating systems are bad!</title><link>https://tferdinand.net/en/all-operating-systems-are-bad/</link><pubDate>Mon, 02 Mar 2020 08:25:00 +0000</pubDate><guid>https://tferdinand.net/en/all-operating-systems-are-bad/</guid><description>&lt;p&gt;I&amp;rsquo;ve been working in the IT world since I came of age, a little over 14 years now.&lt;/p&gt;
&lt;p&gt;One of the only constant rules I&amp;rsquo;ve always found is that the OS you love is always better than all the others.&lt;/p&gt;
&lt;h2 id="the-gems-ive-heard-around-me"&gt;The gems I&amp;rsquo;ve heard around me&lt;/h2&gt;
&lt;p&gt;Among the phrases I can often hear, I could mention a few:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How do you want to develop under Windows?&lt;/li&gt;
&lt;li&gt;A MacBook is a PC with a 1K apple on it.&lt;/li&gt;
&lt;li&gt;Linux is like a Mac, but without the stability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I could go on like this for a long time.&lt;/p&gt;</description></item><item><title>The impostor syndrome</title><link>https://tferdinand.net/en/the-impostor-syndrome/</link><pubDate>Mon, 24 Feb 2020 06:57:00 +0000</pubDate><guid>https://tferdinand.net/en/the-impostor-syndrome/</guid><description>&lt;p&gt;Just over a year ago, I started this blog. More than a hobby, it has helped me to gain confidence in myself and my abilities.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve already talked about it in the past, because of my non professional training, I&amp;rsquo;m often surrounded by highly qualified and competent people, and I&amp;rsquo;ve always had this discomfort of not feeling in my place, of being an impostor in my position.&lt;/p&gt;
&lt;h2 id="a-human-problem-more-than-a-technical-one"&gt;A human problem more than a technical one&lt;/h2&gt;
&lt;p&gt;When I look, however, in all my missions, I have very rarely had negative comments. My clients have always been satisfied with my work. Nevertheless, I felt like I was usurping a job that I didn&amp;rsquo;t deserve as much as people who had studied long and hard to achieve it.&lt;/p&gt;</description></item><item><title>GAFAM: Smile, you offer your data</title><link>https://tferdinand.net/en/gafam-smile-you-offer-your-data/</link><pubDate>Tue, 18 Feb 2020 07:33:00 +0000</pubDate><guid>https://tferdinand.net/en/gafam-smile-you-offer-your-data/</guid><description>&lt;p&gt;GAFAMs, they are everywhere, sometimes clearly visible, like when you go on &lt;a href="https://www.google.com/"&gt;Google&lt;/a&gt;, sometimes much less so, like for example Amazon which owns the &lt;a href="https://www.imdb.com/"&gt;IMDB&lt;/a&gt; site.&lt;/p&gt;
&lt;h2 id="what-are-the-gafams"&gt;What are the GAFAMs?&lt;/h2&gt;
&lt;p&gt;I make this little point for those who don&amp;rsquo;t know what the GAFAMs are. What is commonly called GAFAM are none other than :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;G&lt;/strong&gt;oogle&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A&lt;/strong&gt;pple&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;F&lt;/strong&gt;acebook&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;A&lt;/strong&gt;mazon&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;M&lt;/strong&gt;icrosoft&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These five companies now largely dominate the Internet, and it is very difficult to really do without them.&lt;/p&gt;</description></item><item><title>Is it really greener in the cloud?</title><link>https://tferdinand.net/en/is-it-really-greener-in-the-cloud/</link><pubDate>Mon, 10 Feb 2020 09:00:00 +0000</pubDate><guid>https://tferdinand.net/en/is-it-really-greener-in-the-cloud/</guid><description>&lt;p&gt;“It’s greener on AWS”, I can’t count the number of times I’ve heard this sentence at Amazon conferences.&lt;/p&gt;
&lt;p&gt;Is this mantra that companies repeat to look cool true?&lt;/p&gt;
&lt;h2 id="ecology-the-new-spearhead-of-companies"&gt;Ecology, the new spearhead of companies&lt;/h2&gt;
&lt;p&gt;Year after year, companies, and especially large groups, put forward their efforts always to be “greener”. Each company is, of course, more committed than its competitor. I wonder how we can still have problems related to pollution with so much commitment?&lt;/p&gt;</description></item><item><title>Traefik 2 - TLS Configuration (Rank A+ on SSLLabs)</title><link>https://tferdinand.net/en/traefik-2-tls-configuration/</link><pubDate>Mon, 03 Feb 2020 06:50:00 +0000</pubDate><guid>https://tferdinand.net/en/traefik-2-tls-configuration/</guid><description>&lt;p&gt;&lt;em&gt;Disclaimer: Due to the descriptions I give below, this post will be longer than my usual posts.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Security is everyone&amp;rsquo;s business. As a security architect, I&amp;rsquo;m quite sensitive to these subjects.&lt;/p&gt;
&lt;p&gt;As I talked about it recently, I migrated the reverse proxy of this blog from &lt;a href="https://tferdinand.net/small-migration-guide-from-traefik-1-to-traefik-2/"&gt;Traefik 1 to Traefik 2 recently&lt;/a&gt;. So I decided to configure the TLS part afterwards, my goal being to have a secure site (and therefore safe for my users) by letting Traefik manage all this part.&lt;/p&gt;</description></item><item><title>Extraction of Traefik accesslogs and dashboard creation</title><link>https://tferdinand.net/en/extraction-of-traefik-accesslogs-and-dashboard-creation/</link><pubDate>Thu, 16 Jan 2020 20:21:00 +0000</pubDate><guid>https://tferdinand.net/en/extraction-of-traefik-accesslogs-and-dashboard-creation/</guid><description>&lt;p&gt;A few weeks ago, I wrote an article explaining the migration from Traefik 1 to Traefik 2, but this time I propose to address a crucial point in the implementation of an application, its monitoring.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article explains how I set up my dashboarding, it doesn&amp;rsquo;t explain in any case the &amp;ldquo;enterprise&amp;rdquo; dashboarding that should be more reliable and complete on some points.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;During this article, I will explain how to create this type of dashboard in a very basic way.&lt;/p&gt;</description></item><item><title>The difficulty of implementing DevOps in a company</title><link>https://tferdinand.net/en/the-difficulty-of-implementing-devops-in-a-company/</link><pubDate>Mon, 13 Jan 2020 08:17:36 +0000</pubDate><guid>https://tferdinand.net/en/the-difficulty-of-implementing-devops-in-a-company/</guid><description>&lt;h3&gt;&lt;/h3&gt;
&lt;p&gt;&amp;ldquo;DevOps&amp;rdquo;, that word, one can no longer see an IT job offer for infrastructure or development positions without it being mentioned. Many companies are turning to DevOps, ideas and concepts are mixed, the target is often blurred, while the objectives are clear, leading this transformation is therefore far from being an easy task.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article is written in collaboration with &lt;a href="https://www.linkedin.com/in/pierre-galdon-718a5ba5/"&gt;Pierre Galdon&lt;/a&gt;, a SysOps engineer friend with whom I worked for several years.&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Small migration guide from Traefik 1 to Traefik 2</title><link>https://tferdinand.net/en/small-migration-guide-from-traefik-1-to-traefik-2/</link><pubDate>Mon, 06 Jan 2020 06:03:56 +0000</pubDate><guid>https://tferdinand.net/en/small-migration-guide-from-traefik-1-to-traefik-2/</guid><description>&lt;p&gt;I recently moved the front of this blog from Traefik 1 to Traefik 2, and to say the least, it&amp;rsquo;s no picnic.&lt;/p&gt;
&lt;h2 id="my-traefik-use-case"&gt;My Traefik use case&lt;/h2&gt;
&lt;p&gt;I use Traefik as a load balancer/reverse proxy front in a Kubernetes infrastructure. My use is very basic. Depending on certain path and/or domain, I redirect to separate pods. In the case below, I will consider that I have only one pod, this blog. I also manage my certificates with Traefik via Let&amp;rsquo;s Encrypt.&lt;/p&gt;</description></item><item><title>"When I grow up, I want to be a YouTuber."</title><link>https://tferdinand.net/en/when-i-grow-up-i-want-to-be-a-youtuber/</link><pubDate>Mon, 30 Dec 2019 07:21:27 +0000</pubDate><guid>https://tferdinand.net/en/when-i-grow-up-i-want-to-be-a-youtuber/</guid><description>&lt;p&gt;Today, I am proposing a post inspired by a sentence my wife recently wrote, who works with children in primary and nursery schools. When she asks what the children want to do later, the answer is often the same: YouTuber.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article is written in collaboration with &lt;a href="https://www.linkedin.com/in/julien-monrousseau-523a20170/"&gt;Julien Monrousseau&lt;/a&gt;, an operations analyst friend of mine, who is launching his little YouTube channel centered around video games.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;YouTube, Star &amp;ldquo;2.0&amp;rdquo; creator&lt;/p&gt;
&lt;p&gt;&lt;img src="https://tferdinand.net/quand-je-serais-grand-je-veux-etre-youtubeur/image-en-1.png" alt=""&gt;&lt;/p&gt;</description></item><item><title>At Christmas, don't give the keys to your house to hackers.</title><link>https://tferdinand.net/en/at-christmas-don-t-give-the-keys-to-your-house-to-hackers/</link><pubDate>Sun, 22 Dec 2019 20:46:56 +0000</pubDate><guid>https://tferdinand.net/en/at-christmas-don-t-give-the-keys-to-your-house-to-hackers/</guid><description>&lt;p&gt;The Christmas period is a good time for hacks in companies, with the end-of-year holidays, there is indeed less staff, and therefore less reactivity. But it would be simplistic to see only this aspect.&lt;/p&gt;
&lt;h2 id="hell-has-a-gift-wrapping"&gt;Hell has a gift-wrapping&lt;/h2&gt;
&lt;p&gt;In recent years, connected objects of all kinds have become fashionable: speakers, watches, scales, vacuum cleaners, and this year&amp;rsquo;s fashionable object, connected cameras. All these gadgets can be very useful and have very nice features, but they are also the perfect access to your home for a pirate. Unfortunately, these devices are very often &amp;ldquo;light&amp;rdquo; in terms of embedded security. One might think that this is not too annoying, but from a compromised device, it may eventually be possible to infect an entire network to extract data for example.&lt;/p&gt;</description></item><item><title>Understanding the success of the "Serverless" model</title><link>https://tferdinand.net/en/understanding-the-success-of-the-serverless-model/</link><pubDate>Thu, 19 Dec 2019 12:30:30 +0000</pubDate><guid>https://tferdinand.net/en/understanding-the-success-of-the-serverless-model/</guid><description>&lt;p&gt;Anyone who has ever done infrastructure on a cloud provider has already heard of the serverless model, behind this name is actually hiding many aspects. Let&amp;rsquo;s take a look&amp;hellip;&lt;/p&gt;
&lt;h2 id="the-serverless-model-logical-evolution-of-containers"&gt;The serverless model: logical evolution of containers?&lt;/h2&gt;
&lt;p&gt;For several years now, we have been talking about containers. A revolution over the last 5 years, containers (and orchestrators) have profoundly changed the approach to infrastructure, allowing applications composed of microservices to be deployed more and more simply and quickly. I won&amp;rsquo;t talk about this evolution here.&lt;/p&gt;</description></item><item><title>Terraform VS CloudFormation: Which tool to deploy on AWS?</title><link>https://tferdinand.net/en/terraform-vs-cloudformation-which-tool-to-deploy-on-aws/</link><pubDate>Fri, 13 Dec 2019 11:00:00 +0000</pubDate><guid>https://tferdinand.net/en/terraform-vs-cloudformation-which-tool-to-deploy-on-aws/</guid><description>&lt;p&gt;Terraform or CloudFormation, the two tools are often pitted against each other, asking DevOps to decide and choose one tool or the other. However, from my point of view, these two tools do not necessarily address the same needs.&lt;/p&gt;
&lt;h2 id="asking-the-question-of-ones-exact-need"&gt;Asking the question of one&amp;rsquo;s exact need&lt;/h2&gt;
&lt;p&gt;Before knowing which tool to go to, it is important to know the exact need to be addressed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Do I want to deploy only on AWS?&lt;/li&gt;
&lt;li&gt;Do I need to interface with existing tools (especially CI/CD)?&lt;/li&gt;
&lt;li&gt;Do I want to host the deployment solution myself or depend on a managed service?&lt;/li&gt;
&lt;li&gt;Do I already use other tools from the HashiCorp ecosystem (Nomad, Packer, Consul or Vault for example)?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Indeed, with these questions you can already target the tool you want to use more easily.&lt;/p&gt;</description></item><item><title>"Stop playing video games, that's not the way to get a real job!"</title><link>https://tferdinand.net/en/stop-playing-video-games-that-s-not-the-way-to-get-a-real-job/</link><pubDate>Wed, 04 Dec 2019 21:01:05 +0000</pubDate><guid>https://tferdinand.net/en/stop-playing-video-games-that-s-not-the-way-to-get-a-real-job/</guid><description>&lt;p&gt;&amp;ldquo;Stop playing video games, that&amp;rsquo;s no way to get a real job!&amp;rdquo; I can&amp;rsquo;t count the number of times I&amp;rsquo;ve heard that line. As you can see, today I want to talk to you about one of my passions, video games.&lt;/p&gt;
&lt;p&gt;In the minds of many people, playing games is something futile, which cultivates only one thing: idleness. Not to say that it&amp;rsquo;s completely false, because there&amp;rsquo;s a bit of truth in that, but I don&amp;rsquo;t necessarily agree.&lt;/p&gt;</description></item><item><title>No, the padlock next to your address bar doesn't mean a site is "reliable."</title><link>https://tferdinand.net/en/no-the-padlock-next-to-your-address-bar-doesn-t-mean-a-site-is-reliable/</link><pubDate>Sat, 21 Sep 2019 07:27:39 +0000</pubDate><guid>https://tferdinand.net/en/no-the-padlock-next-to-your-address-bar-doesn-t-mean-a-site-is-reliable/</guid><description>&lt;p&gt;I regularly see this message on shopping sites, and I see that confusion is often made about what a secure connection is.&lt;/p&gt;
&lt;h2 id="securing-the-exchange-with-the-web-server"&gt;Securing the exchange with the web server&lt;/h2&gt;
&lt;p&gt;The presence of a lock near the address bar means that this site is using a TLS certificate to exchange data with you. This ensures that the data exchanged with you is encrypted. The primary purpose of a TLS certificate is to prevent &amp;ldquo;man in the middle&amp;rdquo; attacks.&lt;/p&gt;</description></item><item><title>Linux without SSH? It's possible with Amazon SSM</title><link>https://tferdinand.net/en/linux-without-ssh-it-s-possible-with-amazon-ssm/</link><pubDate>Thu, 18 Jul 2019 07:10:54 +0000</pubDate><guid>https://tferdinand.net/en/linux-without-ssh-it-s-possible-with-amazon-ssm/</guid><description>&lt;p&gt;In a computer park with linux machines, SSH is something classic. Very often scanned, regularly badly secured, it is also a possible entry point for attacks. Moreover, the problem of SSH traceability often pushes companies to set up specific processes.&lt;/p&gt;
&lt;p&gt;On Amazon, it has been possible since last year to log in using SSH without the need for a key, login or password&amp;hellip; and without SSH.&lt;/p&gt;
&lt;h2 id="ssm---systems-manager-agent-amazon-style-configuration-manager"&gt;SSM - Systems Manager Agent: Amazon-style configuration manager&lt;/h2&gt;
&lt;p&gt;Amazon makes it easy to deploy server fleets, however, deploying a server is easy, maintaining it is not necessarily. Many companies will probably choose to use Ansible, Puppet, Chef or another manager configuration.&lt;/p&gt;</description></item><item><title>How to install Docker on a Raspberry Pi</title><link>https://tferdinand.net/en/how-to-install-docker-on-a-raspberry-pi/</link><pubDate>Mon, 15 Jul 2019 17:13:20 +0000</pubDate><guid>https://tferdinand.net/en/how-to-install-docker-on-a-raspberry-pi/</guid><description>&lt;p&gt;I have a number of raspberries at home, these microcomputers the size of credit cards. Small and powerful, they have many uses, such as having a mediacenter on a TV set too old to do it natively.&lt;/p&gt;
&lt;p&gt;I even recently fell for the Raspberry Pi 4 released last month (I&amp;rsquo;m weak against a new toy) to turn it into an application server, with its 4Gb of RAM, there&amp;rsquo;s plenty to do.&lt;/p&gt;</description></item><item><title>Seasonal jobs, gateway for pirates</title><link>https://tferdinand.net/en/seasonal-jobs-gateway-for-pirates/</link><pubDate>Thu, 11 Jul 2019 20:18:49 +0000</pubDate><guid>https://tferdinand.net/en/seasonal-jobs-gateway-for-pirates/</guid><description>&lt;p&gt;With the summer vacation period beginning, it also means the start of seasonal employment. But beware, it also means that this is the gateway for pirates!&lt;/p&gt;
&lt;h2 id="ignorance-of-the-company"&gt;Ignorance of the company&lt;/h2&gt;
&lt;p&gt;By definition, the seasonal worker is not particularly familiar with your company, working methods, contacts etc&amp;hellip; This means that he will probably be more sensitive to phising attempts. Why is this? Someone who does not know the company&amp;rsquo;s habits might not be surprised to receive an email with an Excel invoice file attached, for example, if they are unaware that these are not your ways of working.&lt;/p&gt;</description></item><item><title>Chaos day, a tool to bring Devs and Ops closer together?</title><link>https://tferdinand.net/en/chaos-day-a-tool-to-bring-devs-and-ops-closer-together/</link><pubDate>Tue, 09 Jul 2019 07:50:10 +0000</pubDate><guid>https://tferdinand.net/en/chaos-day-a-tool-to-bring-devs-and-ops-closer-together/</guid><description>&lt;p&gt;I&amp;rsquo;ve been with my current employer for several years, and I&amp;rsquo;ve noticed, as with other employers, that there are unfortunately divisions between developers (Devs) and production engineers (Ops).&lt;/p&gt;
&lt;h2 id="a-different-role-in-it"&gt;A different role in IT&lt;/h2&gt;
&lt;p&gt;Can you really blame people with different jobs, training, expectations and goals for having difficulty understanding each other?&lt;/p&gt;
&lt;p&gt;Be careful, I&amp;rsquo;m not throwing stones at either side, but I have to admit that the roles of the two parties are not the same, even though dev and ops are complementary in order to have an efficient and effective production, while being innovative.&lt;/p&gt;</description></item><item><title>Security: A major new challenge for companies</title><link>https://tferdinand.net/en/security-a-major-new-challenge-for-companies/</link><pubDate>Fri, 31 May 2019 07:11:54 +0000</pubDate><guid>https://tferdinand.net/en/security-a-major-new-challenge-for-companies/</guid><description>&lt;p&gt;Security is a term we often hear these days, yet behind this simple word lie many aspects.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article contains many links to sources or definitions of certain terms, feel free to click on them. (Several links are in french language)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;LinkedIn, WhatsApp, iCloud, Renault : What do these companies have in common? They have all been victims at one time or another of a compromise of their information system.&lt;/p&gt;</description></item><item><title>IT Recruitment: The Roles Have Reversed</title><link>https://tferdinand.net/en/it-recruitment-the-roles-have-reversed/</link><pubDate>Wed, 15 May 2019 20:52:17 +0000</pubDate><guid>https://tferdinand.net/en/it-recruitment-the-roles-have-reversed/</guid><description>&lt;p&gt;Like many people in today&amp;rsquo;s working world who are being hunted today, I am present (among others) on social networks such as LinkedIn. However, because of my professional background, I am one of those people who had a hard time getting their first job.&lt;/p&gt;
&lt;p&gt;I am indeed one of those people who do not have a higher diploma, my schooling having stopped at the baccalaureate.&lt;/p&gt;
&lt;h2 id="2006-first-job---hotliner"&gt;2006: First job - Hotliner&lt;/h2&gt;
&lt;p&gt;In 2006, I landed my first job, I was a hotliner, I answered calls to help individuals on their computers and EGP (Consumer Electronics - TV, DVD player etc&amp;hellip;) for the Fnac and Surcouf. To get this job, I had to send a hundred CVs and cover letters.&lt;/p&gt;</description></item><item><title>Migrate your infrastructure to AWS in an optimal way</title><link>https://tferdinand.net/en/migrate-your-infrastructure-to-aws-in-an-optimal-way/</link><pubDate>Fri, 12 Apr 2019 12:39:56 +0000</pubDate><guid>https://tferdinand.net/en/migrate-your-infrastructure-to-aws-in-an-optimal-way/</guid><description>&lt;p&gt;The Cloud appears to be an Eldorado for many companies: simpler application deployment, cost reduction, use of innovative technologies, so many advantages that Amazon promises to its potential customers, but is it that simple?&lt;/p&gt;
&lt;p&gt;AWS, and the cloud more generally, can be an excellent lever on the points mentioned above, however it is quite easy to lose feathers. In this article, I will list what, for me, seems to be the mistakes to avoid.&lt;/p&gt;</description></item><item><title>AWS Summit 2019 - Paris: Between success and disappointment</title><link>https://tferdinand.net/en/aws-summit-2019/</link><pubDate>Thu, 04 Apr 2019 18:27:27 +0000</pubDate><guid>https://tferdinand.net/en/aws-summit-2019/</guid><description>&lt;p&gt;I was at the AWS Summit in Paris a few days ago. For those of you who don&amp;rsquo;t know this event, it&amp;rsquo;s a full day of conferences around Amazon&amp;rsquo;s cloud, AWS. This meeting is quite interesting because it allows us to get feedback from a lot of companies coming from different backgrounds.&lt;/p&gt;
&lt;p&gt;I was going for the second time, the first time being in 2017. I was waiting for this day given the announced conference schedule.&lt;/p&gt;</description></item><item><title>What if we figured the cloud is just another data center like any other?</title><link>https://tferdinand.net/en/what-if-we-figured-the-cloud-is-just-another-data-center-like-any-other/</link><pubDate>Thu, 28 Feb 2019 19:54:58 +0000</pubDate><guid>https://tferdinand.net/en/what-if-we-figured-the-cloud-is-just-another-data-center-like-any-other/</guid><description>&lt;p&gt;I work daily on Amazon&amp;rsquo;s cloud infrastructure (AWS for short), and I&amp;rsquo;m thinking about the best way to implement new technical solutions on this platform.&lt;/p&gt;
&lt;p&gt;Amazon, and the cloud in general, has brought an impressive freedom:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Deploy on tailor-made infrastructures&lt;/li&gt;
&lt;li&gt;Bringing elasticity to infrastructures&lt;/li&gt;
&lt;li&gt;Benefits from machines on demand&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;However, these new approaches to infrastructure have also brought their share of negatives.&lt;/p&gt;
&lt;p&gt;Previously, to deploy an application in the data center, it was necessary to prepare and properly size its hosting before even starting any deployment, linked to the purchase of suitable hardware, or at least to a resource reservation that had to be amortized over several years.&lt;/p&gt;</description></item></channel></rss>