April 02, 2026

Post Image

Architecture: Zscaler

You open your laptop at home, connect to the company network, and almost immediately a login prompt appears asking you to authenticate — again. Or a website you could access at the office is suddenly blocked. Or your IT team says "it goes through Zscaler" when you ask why something is slow. Zscaler is one of those pieces of infrastructure that affects every developer every day, but almost nobody understands how it actually works. This p… Read More
by Phee Jay

March 19, 2026

Post Image

Explained: Bastion Server

Bastion Server Your database server should never be one misconfigured security group away from the public internet. Yet in many infrastructure setups — especially early-stage ones — that's exactly what happens. Private servers get assigned public IPs. SSH ports get opened to 0.0.0.0/0 . Engineers take shortcuts to move fast, and the exposure quietly accumulates. A Bastion Server is one of the simplest, most effective patterns to prevent this. The… Read More
by Phee Jay

November 10, 2024

Post Image

Explained - IPSec VPN Tunnels

IPSec VPN Tunnels A deep-dive for engineers who need to reason about IPSec at a design level; not just configure it. There's a reason IPSec has survived decades of evolving network architecture; it's not elegant, but it's thorough. Understanding it properly means getting past the surface-level "it encrypts your traffic" explanation and into how the protocol suite actually negotiates, wraps, and protects packets at every hop. W… Read More
by Phee Jay

December 09, 2022

Post Image

Okta - PKCE Verification Failed while requesting token

Understand and resolve the "PKCE verification failed" error when integrating with Okta. This guide explains common causes, such as mismatched code verifiers, and provides troubleshooting steps to ensure secure and successful OAuth 2.0 authentication flows. Read More
by Phee Jay
×