AWS Tools Archive
15 Jul 2015
Launch an Amazon EC2 Instance
By Anuket Jain On 15 July 2015 In AWS Tools
You can use Amazon EC2 to launch as many or as couple of virtual servers as you need, design security and networking, and manage storage. Amazon EC2 empowers you to scale up or down to handle changes
8 Jul 2015
Introduction of EC2 Instance in AWS
By Anuket Jain On 8 July 2015 In AWS Tools
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that gives resizable compute capacity in the cloud. It is intended to make web-scale distributed computing less demanding for developers. Amazon EC2 decreases the time needed to
2 Jul 2015
AWS Identity and Access Management (IAM)
By Anuket Jain On 2 July 2015 In AWS Tools
AWS Identity and Access Management (IAM) empowers you to safely control access to AWS administrations and resources for your users. Using IAM, you can make and oversee AWS users and gatherings, and utilization consents to permit and
12 Jun 2015
Send email using PHP Script with Amazon SMTP Authentication
By Anuket Jain On 12 June 2015 In AWS Tools
On the off chance that you find yourself using Amazon SES for sending active messages in a PHP web application, getting everything set up is much less complex than it may appear. For my situation, this was
8 May 2015
Some more command to use s3 Bucket on CentOS/RHEL
By Anuket Jain On 8 May 2015 In AWS Tools
With the help of this tutorial you can use s3 bucket using command Synchronize a directory tree to S3 Sometime we make some changes in files so except copy all the or copy file individually, we can
6 May 2015
How to configure s3 bucket on CentOS/RHEL 5/6/7
By Anuket Jain On 6 May 2015 In AWS Tools
s3cmd is a command line utility used to transfer your information (photographs, features, archives and so on.), you first make a bucket in one of the AWS Amazon. S3cmd is composed in Python. It’s an open source
5 May 2015
How to generate and check AWS Security Credentials
By Anuket Jain On 5 May 2015 In AWS Tools
When you connect with AWS, you utilize AWS security certifications to confirm who you are and whether you have consent to get to the assets that you are asking. As such, security qualifications are utilized to verify