<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Lance</title>
    <description>The latest articles on Forem by Lance (@lancemk).</description>
    <link>https://forem.com/lancemk</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F316941%2F66df4839-6c5c-4fb1-8785-e00c2a11a12e.jpeg</url>
      <title>Forem: Lance</title>
      <link>https://forem.com/lancemk</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/lancemk"/>
    <language>en</language>
    <item>
      <title>Apache httpd-2.4 - Secured Configuration on Fedora</title>
      <dc:creator>Lance</dc:creator>
      <pubDate>Thu, 20 Feb 2025 07:36:19 +0000</pubDate>
      <link>https://forem.com/lancemk/apache-httpd-24-secured-configuration-on-fedora-3f4f</link>
      <guid>https://forem.com/lancemk/apache-httpd-24-secured-configuration-on-fedora-3f4f</guid>
      <description>&lt;p&gt;To configure a secured Apache HTTP/2.4 on Fedora, you need to install the Apache web server, enable the necessary modules like mod_ssl for SSL encryption and mod_http2 for HTTP/2 support, and then modify your Apache configuration file to specify the protocols and secure your virtual hosts with SSL certificates; essentially, enabling both HTTP/2 and HTTPS functionality on your Apache server. &lt;/p&gt;

&lt;p&gt;Install Apache and necessary modules&lt;/p&gt;

&lt;p&gt;Install Apache.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo dnf install httpd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Install SSL module.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo dnf install mod_ssl
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Install HTTP/2 module.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo dnf install mod_http2
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Enable modules in Apache configuration&lt;/p&gt;

&lt;p&gt;Edit Apache configuration file.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo vi /etc/httpd/conf/httpd.conf
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Load modules.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;LoadModule ssl_module modules/mod_ssl.so
LoadModule http2_module modules/mod_http2.so
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Configure virtual host for HTTPS&lt;/p&gt;

&lt;p&gt;Create a new virtual host block for your domain:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;&amp;lt;VirtualHost *:443&amp;gt;
    ServerName yourdomain.com
    DocumentRoot /var/www/html/yourdomain

    SSLCertificateFile /path/to/your/certificate.crt
    SSLCertificateKeyFile /path/to/your/private.key

    # Enable HTTP/2
    Protocols h2 http/1.1
&amp;lt;/VirtualHost&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Replace yourdomain.com with your actual domain name.&lt;/p&gt;

&lt;p&gt;Replace &lt;code&gt;/path/to/your/certificate.crt&lt;/code&gt; and &lt;code&gt;/path/to/your/private.key&lt;/code&gt; with the paths to your SSL certificate and private key respectively.&lt;/p&gt;

&lt;p&gt;Restart Apache&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;sudo systemctl restart httpd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Important Considerations:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Obtain SSL certificates - You will need to obtain a valid SSL certificate from a trusted certificate authority (CA) to secure your website with HTTPS. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Firewall configuration - Ensure your firewall is configured to allow incoming connections on port 443 (HTTPS). &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;HTTP to HTTPS redirection - Consider using a rewrite rule to automatically redirect all HTTP requests to the HTTPS version of your website. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>reverseproxy</category>
      <category>webserver</category>
      <category>fedora</category>
    </item>
    <item>
      <title>Why Zero-Day Vulnerabilities Are Exploding and How to Protect Your Business</title>
      <dc:creator>Lance</dc:creator>
      <pubDate>Sun, 16 Feb 2025 14:59:20 +0000</pubDate>
      <link>https://forem.com/lancemk/why-zero-day-vulnerabilities-are-exploding-and-how-to-protect-your-business-216l</link>
      <guid>https://forem.com/lancemk/why-zero-day-vulnerabilities-are-exploding-and-how-to-protect-your-business-216l</guid>
      <description>&lt;p&gt;Over the past few years, I've witnessed a dramatic surge in zero-day attacks—a trend that’s reshaping our approach to cybersecurity. Zero-day vulnerabilities, which are essentially unknown flaws in software, have become the go-to entry point for attackers. This explosion isn’t random; it stems from two key factors:&lt;/p&gt;

&lt;p&gt;💻  Sophistication of Attackers&lt;/p&gt;

&lt;p&gt;Today's cyber adversaries are not only better funded and more organized, but they're also constantly innovating. They’re leveraging advanced techniques to identify and exploit vulnerabilities before anyone else even knows they exist.&lt;/p&gt;

&lt;p&gt;⚡ Speed of Technology Adoption&lt;/p&gt;

&lt;p&gt;With businesses rapidly integrating new technologies—from cloud services to IoT devices—the window for patching vulnerabilities is shrinking. New systems often introduce unknown risks, leaving organizations exposed.&lt;/p&gt;

&lt;p&gt;So, how can businesses minimize this risk?&lt;/p&gt;

&lt;p&gt;Secure DevOps Practices (DevSecOps)&lt;/p&gt;

&lt;p&gt;Embedding security into every stage of development helps catch potential vulnerabilities early. Regular code audits, automated testing, and continuous monitoring are essential to reduce the chances of a zero-day slipping through.&lt;/p&gt;

&lt;p&gt;Leveraging Managed Detection and Response (MDR) Services&lt;/p&gt;

&lt;p&gt;With MDR, you gain access to expert threat hunting and rapid incident response. These services are designed to detect unusual activities and mitigate threats—even those exploiting zero-day vulnerabilities—before they can wreak havoc.&lt;/p&gt;

&lt;p&gt;Real-world case studies, such as recent breaches impacting major organizations, underscore the devastating aftermath when zero-day vulnerabilities are exploited. These incidents remind us that proactive defense is not just an IT issue—it’s a strategic business imperative.&lt;/p&gt;

&lt;p&gt;Staying ahead means integrating security into your culture and operations. The evolving threat landscape demands we invest in our defenses as robustly as we invest in our growth.&lt;/p&gt;

</description>
      <category>zeroday</category>
      <category>cybersecurity</category>
      <category>devsecops</category>
      <category>mdr</category>
    </item>
    <item>
      <title>Is Rust a Complex one ?</title>
      <dc:creator>Lance</dc:creator>
      <pubDate>Sat, 22 Jul 2023 17:21:31 +0000</pubDate>
      <link>https://forem.com/lancemk/complex-lang-rust-3jh1</link>
      <guid>https://forem.com/lancemk/complex-lang-rust-3jh1</guid>
      <description>&lt;p&gt;I have been working with &lt;code&gt;Python&lt;/code&gt;, &lt;code&gt;Golang&lt;/code&gt;, and &lt;code&gt;JavaScript&lt;/code&gt; for more than 5 years, with C/C++ as slightly lesser. Each of the syntax, file structures, and even package management ecosystem (be it in existence or not), has largely been friendly to pickup as beginner coder. Myself as an example, is a self taught developer, using extensive Google, YouTube, and of-course, StackOverflow!&lt;/p&gt;

&lt;p&gt;Recently, I have looked back into &lt;code&gt;Rust&lt;/code&gt;, an programming language having complexity on-par, or even surpass that of C++, apart from &lt;code&gt;cargo&lt;/code&gt; being the well controlled portion.&lt;/p&gt;

&lt;p&gt;Nevertheless, the common concept of &lt;code&gt;types&lt;/code&gt;, &lt;code&gt;classes&lt;/code&gt; in conventional OOP, with functional &lt;code&gt;methods&lt;/code&gt; and &lt;code&gt;interface&lt;/code&gt; coding methodology are combined, with more granular controls in-built called &lt;code&gt;macro&lt;/code&gt;, which added on each version update on rust core, has made it ever-harder to grasp fully.&lt;/p&gt;

&lt;p&gt;This is my humble opinion on Rust, as of my current knowledge while learning it. Suggestion on learning methods on Rust are welcome and appreciated.&lt;/p&gt;

&lt;p&gt;I will definitely keep this learning journey posted, that is if I ever climb up this rabbit hole.&lt;/p&gt;

&lt;p&gt;Cheers!&lt;/p&gt;

</description>
      <category>rust</category>
      <category>system</category>
      <category>macros</category>
      <category>syntax</category>
    </item>
  </channel>
</rss>
