Security logoExport TLS/SSL Server Certificate from Internet Browser

DateModifiedViewsCategory

To securely browse the Web, HTTPS protocol is established. The secure protocol requests public certificate which is freely transmitted from a Web site to a client. The public certificate can be exported from Internet browser in Privacy-Enhanced Mail (PEM) format. If a certificate is exported from PKCS #12 or other …

more ...

Surveillance logoCustom Built Surveillance System

Success of a custom built surveillance system mostly depends on initial stage when you design it. A diagram of your surveillance system would be the starting point of your design. it helps outline the future functionality and performance of the system. When a list of the surveillance system components is …

more ...


Security logoConvert Java Keystore to PEM File Format

Java keystore (JKS) file includes public certificates and cryptography keys. It is secured by a password and used in java applications. Other consumers of public certificates and cryptography keys, for example, tools or software libraries might not accept JKS format. In that case, Java keystore file can be converted into …

more ...



Trino logoAccess MinIO S3 Storage in Trino with Hive Metastore

DateModifiedViewsCategory

Trino Hive connector is aimed to access HDFS or S3 compatible storages. One of the key components of the connector is metastore which maps data files with schemas and tables. Two production metastore services are Hive and AWS Glue Data Catalog. Hive metastore works transparently with MinIO S3 compatible system …

more ...

Trino logoHive Standalone Metastore for Trino in Docker

Hive connector in Trino can retrieve data from both HDFS and S3 compatible storages. The connector requests Hive metastore as a link to those storages. There are two types of metastores. The first one is beefy one which includes multiple services. The second one is light weight and is called …

more ...

Docker logoInstall Docker CE in CentOS/RHEL 7

Installing Docker CE in CentOS/RHEL 7 is a trivial process but it is not true in all cases. Specially, when we deal with open source products, maintaining and patching might be an issue for doing it in timely manner. Community forums and other sources are our life savers to …

more ...

Trino logoHide Passwords and Sensitive Data in Trino Configuration Files

Trino configuration files contain passwords and sensitive data in plain text. Corporation security policies are not tolerant with it. That kind of information must be hidden from users who are not authorized to have access to it. As a rule of thumb, DevOps and security teams are responsible to set …

more ...