Blog

We are looking for a new colleague!

News Jobs

This year we are starting a new project entitled "Using blockchain to secure the software supply chain". To work on this project, we are hiring a new researcher in cyberdefense.

Read
Build and store Docker images with GitLab

GitLab Docker

With GitLab, you can add a job to your pipeline to build Docker images, and push them to the built-in container registry. Here is how...

Read
Getting started with Ansible

Sysadmin

Ansible is an extremely powerful configuration management system. Ansible is able to perform a wide range of tasks on a large and heterogeneous ensemble of devices. Indeed, it relies on a system of modules (plugins) that allow to perform different tasks like software provisioning, system and application configuration management, application-deployment etc. Moreover, Ansible modules exist to manage a wide variety of devices like Linux and Windows computers, but also network equipment like switches and routers, kubernetes clusters and other cloud services like AWS, GCE and Azure. For this reasons, Ansible is sometimes coined as an infrastructure automation engine.

Read
File upload, validation and storage with Laravel

Laravel Cyrange

Laravel is a powerful framework, that offers all functionalities required to implement file upload, validation and storage. Here is a complete and concrete example.

Read
Syntax highlighting with prism.js for your Laravel application

Laravel

Prism is a light and easy javascript library that allows to integrate code highlighting in your web application. Here is how to install and use it with Laravel...

Read
A light NAT router and DHCP server with Alpine Linux

Cyber Range Sysadmin Cyrange

Alpine Linux is a very light Linux distribution, that can run with less than 100MB of harddisk space. Here is how to configure Alpine Linux to run as a NAT router and DHCP server.

Read
Network reconnaissance with arp-scan

Offensive Security

arp-scan is a simple tool that can be used list the IP addresses (and devices) used in a network. It works by sender ARP 'who-has' requests for every IP address of the subnet. If the IP address is used by a device, it will reply with an ARP 'reply' packet.

Read
Notifications with toastr and Laravel

Laravel

toastr is a JavaScript library that allows to display nice user notifications in your web application. In this blog post we will see how to integrate toastr in a Laravel project.

Read
Cyrange : scenarios

Cyrange

Today we released version 1.1.0 of the cyrange Cyber Range platform. This version brings an important new feature : scenarios. A scenario allows to define a large scale exercise, involving multiple virtual machines, that can be interconnected using a complex network. Moreover, to run the exercise, the cyrange platform will deploy a copy of each defined VM for each trainee. Let's see how...

Read
We are hiring an IT expert !

News Jobs

We are looking for a new colleague!

Read
DNS over HTTPS and DNS over TLS with dnsdist

Sysadmin

DNS is a real corner stone of privacy and security on the Internet! From the security point of view, DNS is used by your machine to link a domain name to an IP address. DNS is also used to find the email server of a recipient (using MX records). On a desktop computer, DNS is used by email clients to perform auto-configuration. Over the Internet, DNS records are used to prevent BGP hijacking (using RPKI). The list is long! From the privacy point of view, the DNS queries sent by your computer offer a clear view of the services you use.

Read
Laravel action/access control with policies

Laravel PHP

When developing a web application with Laravel, you will usually have to deal with different users, that have different permissions. If the application is quite simple, with only 2 types of users (administrators that are almighty and regular users that have no permission) you can use a middleware to protect your administrator's area. In this blog post we look at Laravel policies, that allow fine-grain control of user actions.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept