top of page
NORATECH
System Architecture | Software Development | DB design | PKI and Security



Why Did Peterson, an MIT and Dartmouth Graduate, Fail as a Leader?
Why did a highly educated leader from MIT and Dartmouth fail as a General Manager? Eric Peterson’s story reveals that leadership failure is not about intelligence or hard work alone. Unclear authority, weak organizational structure, lack of executive support, and poor team alignment can undermine even the most qualified leaders. Real leadership begins with defined power, direction, and influence.
NOURA ALSHAREEF
19 hours ago7 min read


Set your own DNS server
how to set a standalone DNS server
NOURA ALSHAREEF
Apr 15, 20242 min read


HOW DNS Works?
Hello readers of the NoraTech blog! I wanted to share a recent experience I had that made me realize the importance of having a DNS server. Let me explain why it became necessary and how it can benefit all of us. You see, when we access websites or online services, we usually use easy-to-remember domain names like " google.com " instead of typing in complicated IP addresses. It's much simpler to remember and type a name like " google.com " rather than a string of numbers. I'm
NOURA ALSHAREEF
Mar 5, 20244 min read


Secure Your Apps with HTTPS
In our previous article titled " How HTTPS Works ?" we delved into the concepts of HTTPS, TCP, TLS, and SNI. Now, as a developer, you might be contemplating the most effective approach to ensure that your apps utilize HTTPS seamlessly. This raises the question: what strategy should you adopt? While some developers opt for implementing HTTPS individually for each app, I personally advocate for concluding the handshake at the reverse proxy. The underlying rationale behind this
NOURA ALSHAREEF
Feb 11, 20245 min read


Create a Server certificate
In our previous article on " How HTTPS Works ?", we discussed the concepts of HTTPS, TCP, TLS, and SNI. We learned that servers have their own keypair and certificate to facilitate the TLS handshake. In this article, we will explore how to create a server certificate, which is essential for proving the identity of a server in real-world scenarios. In the real world, every component of a network or service is assigned a Fully Qualified Domain Name (FQDN) or hostname and is equ
NOURA ALSHAREEF
Feb 11, 20243 min read


Create a Simple Dotnet 8 App in Linux
In many of our articles, we often find ourselves needing to create services to showcase various IT concepts such as TLS, DNS, and Understanding HTTP. This article is all about creating simple dotnet 8 apps that you can use to test out these IT concepts in a practical way. So, let's dive in and create some awesome apps together! Create App1 and App2 and app3 1. Install the .NET Core SDK Open a terminal window on your Linux machine and follow the official Microsoft docume
NOURA ALSHAREEF
Feb 11, 20243 min read


How HTTPS Works?
Perhaps, you've noticed a little lock icon next to your browser's URL bar when visiting certain websites. That's HTTPS in action. But what exactly is HTTPS? Well, HTTPS, or Hypertext Transfer Protocol Secure , is an extension of the HTTP. It is used for secure communication over a computer network, such as the internet, and is broadly used on the World Wide Web. HTTPS is a communication protocol that is built on top of the TCP (Transmission Control Protocol) protocol. The HTT
NOURA ALSHAREEF
Dec 2, 20237 min read


Installing and Configuring the SafeNet Luna Network HSM Appliance
Explore the journey of procuring, installing, and setting up the SafeNet Luna Network HSM appliance. Gain insights into the procurement proc
NOURA ALSHAREEF
Nov 28, 20237 min read


Building a .NET Application for HSM Communication
Learn how to build a powerful .NET application for HSM communication in this comprehensive guide. Dive into code examples and expert tips!
NOURA ALSHAREEF
Nov 24, 20235 min read


Exploring HSM Interactions: A Journey through SoftHSM
Before you dive into acquiring an HSM appliance, I strongly urge you to try softHSM. It's a valuable tool for understanding initialization,
NOURA ALSHAREEF
Nov 18, 20235 min read


HSM Overview
Discover the significance of Hardware Security Modules (HSMs) in data security. Learn about security tokens, key setup procedures, and more
NOURA ALSHAREEF
Nov 14, 20234 min read


PKI: Everything You Need to Know
Gain clarity on PKI concepts, system requirements, and structure with this essential article. A must-read for project and technical managers
NOURA ALSHAREEF
Nov 7, 20236 min read


Certificate Verification: Exploring OCSP, CRL, and Revocation
In our previous article titled " Demystifying Digital Certificates for Enhanced Trust and Security ," we explored the fundamental concepts of digital certificates and the role of Certificate Authorities (CAs) in establishing trust in the digital world. Building upon that knowledge, this article aims to take a deeper dive into the critical process of verifying certificates. We will unravel the significance of OCSP (Online Certificate Status Protocol), CRL (Certificate Revocati
NOURA ALSHAREEF
Nov 4, 20237 min read


Demystifying Digital Certificates: Types, Security & Practical Guide
Think back to our previous article , we explored encryption and digital signatures, delving into their importance. Now, let's continue our digital journey and discover the world of digital certificates. Imagine our friend Eman, who has many keys from different people, including Ahmed. But how can she trust these keys without any labels? Enter the digital certificates, our heroes! They provide a way to connect the keys to their rightful owners, building trust. Eman's contacts
NOURA ALSHAREEF
Oct 31, 20238 min read


Mastering Encryption, Decryption and Signing: A Practical Guide
Embarking on a journey through the realms of encryption, digital signatures, and digital certificates? Great! This guide is here to navigate you smoothly, ensuring you not only grasp the fundamental concepts of cryptography but also gain the necessary skills to shield your digital treasures effectively. Let's dive in! Encryption Imagine you have a top-secret message that you need to transmit safely. This is where encryption comes into play! Encryption transforms your message
NOURA ALSHAREEF
Oct 24, 20236 min read


Fixing Sticky Session Management Issues: Consistent Hashing and Layered Reverse Proxy Approach
My team and I usually develop web-apps through a commonly-used partitioned strategy with an isolated REST API backend application-server that handles HTTP requests from a front-end web-server, usually served through Nginx. My web-app uses browser-cookie based user-authentication, handled by the application-server. The cookie value is mapped to an object that holds all information about the user. This information is calculated the first time the user logs in, and subsequent re
NOURA ALSHAREEF
Oct 21, 20234 min read


Implementing Simple and Consistent Hashing in NGINX and HAProxy
we'll explore practical implementation of consistent hashing for achieving equitable distribution.
NOURA ALSHAREEF
Oct 17, 20232 min read


Consistent Hashing
In recent years, distributed systems have become popular due to concepts like cloud computing and big data. Distributed caches, which power many high-traffic websites, use a type of distributed hashing that takes advantage of an algorithm called consistent hashing. Before defining consistent hashing, let's quickly review the concept of hashing. Simple hashing Simple hashing is a basic method of generating a hash value from a given input using a hash function. The hash functio
NOURA ALSHAREEF
Jul 9, 20235 min read
Welcome to NoraTech: Your Ultimate Guide to Technology and Coding
NoraTech: Your ultimate resource for tech enthusiasts. Discover insightful articles, tips, and tricks on System architecture, development, DB, PKI , and security, and more. Stay up-to-date with the latest trends and find resources for developers of all levels. Join our community and fuel your passion for technology ♡
NOURA ALSHAREEF
Jun 3, 20231 min read
bottom of page



