Thanks for watching! If you like this content we need your support to grow our channel. Please subscribe and share it with your friends. If you have any suggestions, please share with us too 🙂
topics not taught onLy , JSON VERY BASIC MEANING , NETW0RKING FOR AWS LIKE IP PORT IP AND PORT FORWARDING CIDR FORMULA RANGE HOW MANY RANGE SUBNET BASIC NETWORKING PLAYLIST RRACERUTE AND NETSTAT LIKE 3-4 HOURS PLAYLIST NETWORKING FOR CLOUD FIREWALL BASICS STATEFUL STATELESS , PLAYLIST FPE LOG AND TROUBESHOOTNG LIUX. NO PROPER VEDIO ON MAKING MASTER SLAVE HOE BACKUP AND INCREMENTAL BACUKP DB PERFONA ETC ,SESSION LOCK HOW , HOW BACKUP WITHUT LOCK TABLES , VERY IMP AWS SECURITY CERTIFCIATION SERIES MISSING IN TH-cam .
Manoj, In your very first video on KMS Demo you mentioned KMS for RDS or Redshift. But I haven't seen any of those videos in the next as you say in ending your videos. Kindly show me which video has that. However, thank you very much for all that you're doing. Love your explanations.
Why somebody cannot: 1. Steal the Encrypted Data Key 2. Go to KMS, present stolen Encrypted Data key, and get Plaintext Data Key 3. Use Plaintext Data Key and decrypt the encrypted data? The same way the resoning behind "not storing Plaintext Data Key cos somebody can steal" it was done... What is the benefit of adding extra layer of roundtrip to KMS and how it protects from getting Plaintext Data Key?
I come up with the same question. But then I thought about how will the hacker enter the KMS? You store the credentials of the KMS API on your environment. So basically what I am saying is it might be just the authentication. Dont know tho
Thanks for watching! If you like this content we need your support to grow our channel. Please subscribe and share it with your friends. If you have any suggestions, please share with us too 🙂
topics not taught onLy , JSON VERY BASIC MEANING , NETW0RKING FOR AWS LIKE IP PORT IP AND PORT FORWARDING CIDR FORMULA RANGE HOW MANY RANGE SUBNET BASIC NETWORKING PLAYLIST RRACERUTE AND NETSTAT LIKE 3-4 HOURS PLAYLIST NETWORKING FOR CLOUD FIREWALL BASICS STATEFUL STATELESS , PLAYLIST FPE LOG AND TROUBESHOOTNG LIUX. NO PROPER VEDIO ON MAKING MASTER SLAVE HOE BACKUP AND INCREMENTAL BACUKP DB PERFONA ETC ,SESSION LOCK HOW , HOW BACKUP WITHUT LOCK TABLES , VERY IMP AWS SECURITY CERTIFCIATION SERIES MISSING IN TH-cam .
I really like how you are clear and straight to the point. I just subscribed to your channel. Thank you for what you do!
well explained. thank you :)
wow. clear like water. thanks
You're welcome :)
This is so useful. Thanks
Manoj, In your very first video on KMS Demo you mentioned KMS for RDS or Redshift. But I haven't seen any of those videos in the next as you say in ending your videos. Kindly show me which video has that. However, thank you very much for all that you're doing. Love your explanations.
Nailed it BRo!
Very nice bro. 👌
Very Nice
perfect video
concise explanation. Good job
excellent video sir!
Suprb explanation bro ,make more videos realtime base ...and blogs
Well explained sir!!!!
Ur Way of explaining is too good and blog URLs what u shared they were not working.
Why somebody cannot:
1. Steal the Encrypted Data Key
2. Go to KMS, present stolen Encrypted Data key, and get Plaintext Data Key
3. Use Plaintext Data Key and decrypt the encrypted data?
The same way the resoning behind "not storing Plaintext Data Key cos somebody can steal" it was done...
What is the benefit of adding extra layer of roundtrip to KMS and how it protects from getting Plaintext Data Key?
I come up with the same question. But then I thought about how will the hacker enter the KMS? You store the credentials of the KMS API on your environment. So basically what I am saying is it might be just the authentication. Dont know tho
my other question is couldnt the hacker open the dev tools and get the plaintext data key which can be used for decrypt the encrypted data?
the document is not opening..
derivation error,, due to openssl versions conflic,,
404 i get for blog link
strong accent and low volume