USB devices can be a liability : they can be used to exfiltrate data from a computer or server, to plug a hardware keylogger, or to plant a malware. Hence on a managed computer, USB devices should be filtered and whitelisted. In this blog post we show how this can be achieved thanks to udev, and some PHP code.
ReadScapy is a wonderful Python library that allows to craft packets and send them on a network. In this blog post we show how Scapy can be used to read a pcap file, in order to detect abnormal behavior.
ReadWhen working on different projects, you may have to switch between different versions of PHP. In this blog post we show how to install and use different versions PHP on Ubuntu.
ReadWith recent events on Twitter, the micro-blogging network Mastodon has gained a lot of interest. Unlike Twitter, Mastodon is free and open-source software. Moreover, Mastodon uses a decentralized approach: the Mastodon network is composed of multiple instances managed by different suppliers, each with its own code of conduct, terms of service, privacy policy, privacy options, and moderation policies. If you want to support the network, here is how you can add 'Share on Mastodon' icons on your website.
ReadKubernetes is a complex beast, with lots of available drivers and plugins to handle different types of clusters. For example, to handle networking between pods in the cluster, you must install a CNI (Container Network Interface) plugin like Flannel, Calico, Weave Net, Cilium or other. To handle storage and volumes, you can install one of multiple CSI (Container Storage Interface) plugins like CephFS, GlusterFS, Google Cloud Storage etc. In this blog post we show how to use MicroK8s to simplify the installation process.
ReadThe example below provides some sound configuration parameters for Apache, to help protect your web application. These values can naturally be tweaked for your particular app.
ReadWe are currently organizing coaching sessions in preparation for the Cyber Security Challenge that will take place in March. Students from the Royal Military Academy and from Molengeek are participating. Check the publication on BelDefNews...
ReadLoki is a log database developed by Grafana Labs. It is similar to Elasticsearch, with some major conceptual differences:
Read2-factor authentication is an important protection for a web application. In this blog post we see how Time based One Time Password (TOTP) authentication works, and how it can be implemented in a Laravel application...
ReadThis week we are presenting 3 papers at Digilience 2022, the conference on digital transformation, cybersecurity and resilience, in Plovdiv (Bulgaria):
ReadLaTeX may be almost 40 years old now (first release dates from 1984), it is still a very active ecosystem. On CTAN, more than 100 packages are created or updated every month. To get the best results for your book or paper, you should keep your LaTeX packages updated. This is precisely the goal of TeX Live...
ReadYou probably use ssh on a regular basis. It's easy and powerful. But once in a while you might be confronted to ssh utility tools like ssh-agent and ssh-add. What are these, and what are they used for?
Read