Hands-On Lab: Use Service Principal to Authenticate Terraform to Azure

Learn how to configure Terraform to authenticate to Azure using a Service Principal with a client secret. Step-by-step guide to securely provision resources without using personal credentials.

October 15, 2025 · 433 words · Sonam Tamang

From Zero to Cloud: Deploying My First 2-Tier App

Introduction 📩 Note: This Project is a part of 13 week long DevOps Micro Intership(DMI). If you want to learn DevOps with hands-on practice and live projects for free, you can follow the YouTube Playlist by Pravin Mishra. This is my first 2-tier application architecture deployment project. I have good experience working on static and monolithic applications, but I haven’t worked on a 2-tier application until now. This project is my first real exposure to RDS, VPC, subnets, route tables, and security groups. ...

September 15, 2025 · 1405 words · Sonam Tamang

How I Deployed My First Static Site Using S3 Buckets

Background As a Part of Devops Micro Intership (DMI) with Pravin Mishra, I Explore the Cloud Services , especially focusing on AWS . We have learned from basic to advance concepts of AWS services. It was very practical learning with hands on Experience with Real life projects and Assignments. As a Part of Assignment , I Learned the concept of S3 buckets and deployed my first static site on S3 buckets. ...

September 11, 2025 · 435 words · Sonam Tamang

Why Every IT Graduate Doesn’t Need to Be a Developer

Growth of Technology The invention of computers really changed the whole world. It has played a big role in the development of science and technology. After the internet came, the world slowly turned into a global village. Today people can’t imagine life without computers, mobile phones, or the internet. We depend on IT in almost everything — education, health, entertainment, communication. It’s no longer a choice, it’s a need. Old College Syllabus But here is the issue. Technology is changing very fast, but our colleges are still teaching the same old syllabus. ...

August 19, 2025 · 648 words · Sonam Tamang

Investigating Facebook Account Takeovers

Background I was chilling in my workspace, solving TryHackMe challenges, when one of my friends sent me a video. In the video, I saw that one of our mutual friend’s Facebook accounts had been compromised. A minute later, the friend whose Facebook had been hacked called me. I asked him what had happened, and he simply told me that he had been logged out of Facebook and no longer had access.I advised him to try recovering his Facebook account by resetting the password. I also reported to Facebook that my friend’s account had been hacked and informed other friends to report the incident as well. ...

February 19, 2025 · 612 words · Sonam Tamang

GitHub Email Leak

Introduction: GitHub is one of the most significant and widely used tools by IT professionals and developers. It serves as an essential platform for version control and code backup, enabling seamless collaboration and teamwork. Developers and programmers often place blind trust in GitHub when deploying their code. However, misconfiguration has become one of the biggest emerging issues in the security of the digital world. How Emails are Exposed GitHub has a default feature that can expose your email address to anyone. While this is not a vulnerability, GitHub does offer an option to hide your email. However, many users are unaware of this setting. Let’s explore how your email can be revealed and how to prevent it from happening. ...

December 13, 2024 · 283 words · Sonam Tamang