top of page
NORATECH
NORATECH
System Architecture | Software Development | DB design | PKI and Security



Set your own DNS server
how to set a standalone DNS server
NOURA ALSHAREEF
Apr 15, 20242 min read
Â
Â


HOW DNS Works?
Hello readers of the NoraTech blog! I wanted to share a recent experience I had that made me realize the importance of having a DNS...
NOURA ALSHAREEF
Mar 5, 20244 min read
Â
Â


Secure Your Apps with HTTPS
In our previous article titled "How HTTPS Works?" we delved into the concepts of HTTPS, TCP, TLS, and SNI. Now, as a developer, you might...
NOURA ALSHAREEF
Feb 11, 20245 min read
Â
Â


Create a Server certificate
In our previous article on "How HTTPS Works?", we discussed the concepts of HTTPS, TCP, TLS, and SNI. We learned that servers have their...
NOURA ALSHAREEF
Feb 11, 20243 min read
Â
Â


Create a Simple Dotnet 8 App in Linux
In many of our articles, we often find ourselves needing to create services to showcase various IT concepts such as TLS, DNS, and...
NOURA ALSHAREEF
Feb 11, 20243 min read
Â
Â


How HTTPS Works?
Perhaps, you've noticed a little lock icon next to your browser's URL bar when visiting certain websites. That's HTTPS in action. But...
NOURA ALSHAREEF
Dec 2, 20237 min read
Â
Â


Installing and Configuring the SafeNet Luna Network HSM Appliance
Explore the journey of procuring, installing, and setting up the SafeNet Luna Network HSM appliance. Gain insights into the procurement proc
NOURA ALSHAREEF
Nov 28, 20237 min read
Â
Â


Building a .NET Application for HSM Communication
Learn how to build a powerful .NET application for HSM communication in this comprehensive guide. Dive into code examples and expert tips!
NOURA ALSHAREEF
Nov 24, 20235 min read
Â
Â


Exploring HSM Interactions: A Journey through SoftHSM
Before you dive into acquiring an HSM appliance, I strongly urge you to try softHSM. It's a valuable tool for understanding initialization,
NOURA ALSHAREEF
Nov 18, 20235 min read
Â
Â


HSM Overview
Discover the significance of Hardware Security Modules (HSMs) in data security. Learn about security tokens, key setup procedures, and more
NOURA ALSHAREEF
Nov 14, 20234 min read
Â
Â


PKI: Everything You Need to Know
Gain clarity on PKI concepts, system requirements, and structure with this essential article. A must-read for project and technical managers
NOURA ALSHAREEF
Nov 7, 20236 min read
Â
Â


Certificate Verification: Exploring OCSP, CRL, and Revocation
In our previous article titled "Demystifying Digital Certificates for Enhanced Trust and Security," we explored the fundamental concepts...
NOURA ALSHAREEF
Nov 4, 20237 min read
Â
Â


Demystifying Digital Certificates: Types, Security & Practical Guide
Think back to our previous article, we explored encryption and digital signatures, delving into their importance. Now, let's continue our...
NOURA ALSHAREEF
Oct 31, 20237 min read
Â
Â


Mastering Encryption, Decryption and Signing: A Practical Guide
Embarking on a journey through the realms of encryption, digital signatures, and digital certificates? Great! This guide is here to...
NOURA ALSHAREEF
Oct 24, 20235 min read
Â
Â


Fixing Sticky Session Management Issues: Consistent Hashing and Layered Reverse Proxy Approach
My team and I usually develop web-apps through a commonly-used partitioned strategy with an isolated REST API backend application-server...
NOURA ALSHAREEF
Oct 21, 20234 min read
Â
Â


Implementing Simple and Consistent Hashing in NGINX and HAProxy
we'll explore practical implementation of consistent hashing for achieving equitable distribution.
NOURA ALSHAREEF
Oct 17, 20232 min read
Â
Â


Consistent Hashing
In recent years, distributed systems have become popular due to concepts like cloud computing and big data. Distributed caches, which...
NOURA ALSHAREEF
Jul 9, 20235 min read
Â
Â
Welcome to NoraTech: Your Ultimate Guide to Technology and Coding
NoraTech: Your ultimate resource for tech enthusiasts. Discover insightful articles, tips, and tricks on System architecture,...
NOURA ALSHAREEF
Jun 3, 20231 min read
Â
Â
bottom of page