Blog

MARk : use built-in file data source

MARk

The Multi-Agent Ranking framework (MARk) allows to quickly build ranking and detection systems by combing building blocks. In this blog post, we show how to use the file data source to inject data into the system...

Read
Force https with HTTP Strict Transport Security (HSTS)

Secure Software Development

Once you have https enabled for your website (with Letsencrypt for example), you should make sure all your users use the secure version of the site. Typically this done using a redirect. However this still leaves a window of opportunity (the initial HTTP connection) for an attacker to downgrade or redirect the request. With a Strict Transport Security header, you can force a browser to only connect to your server using HTTPS.

Read
Laravel optimization : static content caching and cache busting

Laravel Cyber-Wise

Optimizing you web app from the browser side is an important concern, to provide a pleasant experience to your users. It will also reduce the traffic on your servers. In this post we show how to implement static content caching and cache busting on a Laravel application.

Read
Harden your Laravel app with CSP headers

Laravel Secure Software Development Docker Cyber-Wise

CSP (Content Security Policy) reduces the risk of cross-site scripting and other content-injection attacks by defining, at the level of the webserver, a header that whitelists authorized sources of content for your website.

Read
Exposing a Kubernetes application : Service, HostPort, NodePort, LoadBalancer or IngressController?

Kubernetes

Having your app running on Kubernetes is one important step. Now you have to make this killer app accessible from the Internet. And as usual with Kubernetes, there are a lot of possibilities Here are a few definitions and examples to help you understand your choices...

Read
HTTP benchmarking with wrk2

DevOps GitLab

One important step of any DevOps toolchain consists in testing the performance of the web application before the new version is deployed in production. HTTP benchmarking is a complex subject as a lot of parameters intervene in the perceived performance of the application.

Read
Install and use Dell OpenManage Server Administrator (OMSA) on Ubuntu

Sysadmin

Dell OpenManage Server Administrator (OMSA) is a Dell utility to monitor your Dell servers. Here is how to install and use OMSA on a Ubuntu server...

Read
Run your Laravel application on Kubernetes

Kubernetes Laravel

In this blog post series we will present how to deploy a Laravel app on Kubernetes. In this first tutorial, we start with a simple setup, and leave horizontal scaling and high-availability for a follow-up post...

Read
Multi-tenant Kubernetes cluster : namespace, quota and kubectl user

Kubernetes

When multiple users must use the same kubernetes cluster, a good practice consists in segregating them in isolated namespaces. In this tutorial we show how to create a namespace, apply quotas so the user cannot exhaust the resources (memory and cpu) of the cluster, and create a dedicated kubectl user.

Read
Add users to a group in Nextcloud

Nextcloud

If you are administrator of a group in Nextcloud, you have the possibility to create accounts yourself, and to add these new users to your group. Doing so, they will have access to all folders shared with the group. Here is a step-by-step example.

Read
Create your own VM image for the Cyber Range

Cyrange Cyber Range

cyrange is a Cyber Range platform built on top of VirtualBox. It brings some some additional features to support education and training:

Read
Change the MAC address of your Linux system

Offensive Security Sysadmin

Still today, some network monitoring tools and security systems rely on the MAC address of the host. However, a MAC address is not an authentication mechanism! It can be easily changed. More precisely, by default most operating systems will use the MAC address burnt into the network interface as the source MAC address for all emitted Ethernet frames. But you can easily reconfigure your system to change this behavior. Here is how to do that on a Linux computer.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept