Security is not a tool that you buy rather it’s a strategy that an organization needs to follow and implement. Here I have shown security best practices. Interested in learning about smart security locks, then visit this website for in detail discussion.

Best Practices for PHP Security in AWS: Protecting Your Applications

In the rapidly evolving world of web development, security should be a top priority for every developer and organization. PHP, a server-side scripting language, has been a cornerstone of web application development for decades and powers a significant portion of the web today. Meanwhile, Amazon Web Services (AWS), the leading cloud service provider, offers a

Read More »

Securing Java Applications on Amazon Linux 2023

As a seasoned Java developer, I understand the increasing importance of application security in today’s digital landscape. Given that Java remains one of the most popular programming languages, the applications we develop often handle sensitive data and business-critical operations, making them attractive targets for cyber threats. This underscores the need for us to be vigilant

Read More »

10 Essential Books for AWS Certifications

Welcome to our comprehensive guide on preparing for your AWS (Amazon Web Services) certification! As the popularity and importance of cloud computing continue to rise, so does the need for professionals who are well-equipped to handle cloud-based infrastructure and solutions. AWS, a frontrunner in the cloud computing market, offers several levels of certifications to validate

Read More »

Top 5 books on Hacking

Welcome to the fascinating world of ethical hacking! As someone who’s spent years navigating the intricacies of cybersecurity, penetrating systems to expose vulnerabilities, and helping organizations fortify their defenses, I’m excited to share some of my favorite books on the subject. The realm of hacking is vast and filled with knowledge, and sometimes, it can

Read More »

How to Scan Malware in AWS EC2 Instances

Malware is a type of software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. It can take many forms, such as viruses, worms, ransomware, and trojans, and can be spread through various means, including email attachments, social media links, and online downloads. How To Scan Malware via AWS

Read More »
About Myself

Atiqur Rahman

I am Atiqur Rahman graduated from BUET and am an AWS-certified solutions architect.


We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to and affiliated sites. We also participate in programs from eBay, CJ, Bluehost, Clickbank, ShareASale, and other sites. AwsWithAtiq is compensated for referring traffic and business to these companies.