top of page
NORATECH
System Architecture | Software Development | DB design | PKI and Security

سلسلة رحلة التطوير (1) : تجهيز بيئة التطوير – المبدأ أولًا
كمطورين، أعتقد أن كثيرًا منا مرّ بمرحلة إعداد بيئة التطوير (Development Environment) على جهازه قبل البدء بالبرمجة (تحميل أطر العمل Frameworks، إعداد متغيرات البيئة Environment Variables، تحميل المكتبات المطلوبة Libraries، التأكد من الإصدارات Versions، وحل التعارضات بين الأدوات القديمة والجديدة، إلخ). وإذا كان المشروع يضم أكثر من مطور، فإن كل واحد منهم يمر بالتجربة نفسها. صحيح أن ذلك يمنح فهمًا أعمق للبيئة، خصوصًا للمطور الجديد، لكنه مع الوقت يصبح مرهقًا ويستهلك جهدًا أكبر مما
NOURA ALSHAREEF
قبل 12 ساعة3 دقيقة قراءة


Set your own DNS server
how to set a standalone DNS server
NOURA ALSHAREEF
15 أبريل 20242 دقيقة قراءة


HOW DNS Works?
Hello readers of the NoraTech blog! I wanted to share a recent experience I had that made me realize the importance of having a DNS...
NOURA ALSHAREEF
5 مارس 20244 دقيقة قراءة


Secure Your Apps with HTTPS
In our previous article titled "How HTTPS Works?" we delved into the concepts of HTTPS, TCP, TLS, and SNI. Now, as a developer, you might...
NOURA ALSHAREEF
11 فبراير 20245 دقيقة قراءة


Create a Server certificate
In our previous article on "How HTTPS Works?", we discussed the concepts of HTTPS, TCP, TLS, and SNI. We learned that servers have their...
NOURA ALSHAREEF
11 فبراير 20243 دقيقة قراءة


Create a Simple Dotnet 8 App in Linux
In many of our articles, we often find ourselves needing to create services to showcase various IT concepts such as TLS, DNS, and...
NOURA ALSHAREEF
11 فبراير 20243 دقيقة قراءة


How HTTPS Works?
Perhaps, you've noticed a little lock icon next to your browser's URL bar when visiting certain websites. That's HTTPS in action. But...
NOURA ALSHAREEF
2 ديسمبر 20237 دقيقة قراءة


Installing and Configuring the SafeNet Luna Network HSM Appliance
Explore the journey of procuring, installing, and setting up the SafeNet Luna Network HSM appliance. Gain insights into the procurement proc
NOURA ALSHAREEF
28 نوفمبر 20237 دقيقة قراءة


Building a .NET Application for HSM Communication
Learn how to build a powerful .NET application for HSM communication in this comprehensive guide. Dive into code examples and expert tips!
NOURA ALSHAREEF
24 نوفمبر 20235 دقيقة قراءة


Exploring HSM Interactions: A Journey through SoftHSM
Before you dive into acquiring an HSM appliance, I strongly urge you to try softHSM. It's a valuable tool for understanding initialization,
NOURA ALSHAREEF
18 نوفمبر 20235 دقيقة قراءة


HSM Overview
Discover the significance of Hardware Security Modules (HSMs) in data security. Learn about security tokens, key setup procedures, and more
NOURA ALSHAREEF
14 نوفمبر 20234 دقيقة قراءة


PKI: Everything You Need to Know
Gain clarity on PKI concepts, system requirements, and structure with this essential article. A must-read for project and technical managers
NOURA ALSHAREEF
7 نوفمبر 20236 دقيقة قراءة


Certificate Verification: Exploring OCSP, CRL, and Revocation
In our previous article titled "Demystifying Digital Certificates for Enhanced Trust and Security," we explored the fundamental concepts...
NOURA ALSHAREEF
4 نوفمبر 20237 دقيقة قراءة


Demystifying Digital Certificates: Types, Security & Practical Guide
Think back to our previous article, we explored encryption and digital signatures, delving into their importance. Now, let's continue our...
NOURA ALSHAREEF
31 أكتوبر 20237 دقيقة قراءة


Mastering Encryption, Decryption and Signing: A Practical Guide
Embarking on a journey through the realms of encryption, digital signatures, and digital certificates? Great! This guide is here to...
NOURA ALSHAREEF
24 أكتوبر 20235 دقيقة قراءة


Fixing Sticky Session Management Issues: Consistent Hashing and Layered Reverse Proxy Approach
My team and I usually develop web-apps through a commonly-used partitioned strategy with an isolated REST API backend application-server...
NOURA ALSHAREEF
21 أكتوبر 20234 دقيقة قراءة


Implementing Simple and Consistent Hashing in NGINX and HAProxy
we'll explore practical implementation of consistent hashing for achieving equitable distribution.
NOURA ALSHAREEF
17 أكتوبر 20232 دقيقة قراءة


Consistent Hashing
In recent years, distributed systems have become popular due to concepts like cloud computing and big data. Distributed caches, which...
NOURA ALSHAREEF
9 يوليو 20235 دقيقة قراءة


Welcome to NoraTech: Your Ultimate Guide to Technology and Coding
NoraTech: Your ultimate resource for tech enthusiasts. Discover insightful articles, tips, and tricks on System architecture,...
NOURA ALSHAREEF
3 يونيو 20231 دقيقة قراءة
bottom of page



