Blog

Harden your Laravel app with CSP headers

Laravel Secure Software Development Docker Cyber-Wise

CSP (Content Security Policy) reduces the risk of cross-site scripting and other content-injection attacks by defining, at the level of the webserver, a header that whitelists authorized sources of content for your website.

Read
Exposing a Kubernetes application : Service, HostPort, NodePort, LoadBalancer or IngressController?

Kubernetes

Having your app running on Kubernetes is one important step. Now you have to make this killer app accessible from the Internet. And as usual with Kubernetes, there are a lot of possibilities Here are a few definitions and examples to help you understand your choices...

Read
HTTP benchmarking with wrk2

DevOps GitLab

One important step of any DevOps toolchain consists in testing the performance of the web application before the new version is deployed in production. HTTP benchmarking is a complex subject as a lot of parameters intervene in the perceived performance of the application.

Read
Avoid Docker Hub pull limit with Gitlab

GitLab Docker

If you are familiar with Docker, you most likely know Docker Hub. For the others, a quick definition: Docker Hub is a service for finding and sharing container images. It is the world largest container image repository. It is widely used around the world

Read
What is Obsidian.md and why you should use it

Tools

In everyday life we need to constantly keep ourselves reminded of important information. Some people write this information on post-it notes, notebooks or using programs such as Microsoft Word or Google Notes. The problem is, that information is in itself transitive- one piece of data or a note can lead to another one and it can become cumbersome and difficult to follow the trail of information. Our brain works the same way, usually we store information by association- to remember a fact, we try to think, for example, of where we learned the fact, or who told it to us, and follow the links to the information we try to remember.

Read
Install and use Dell OpenManage Server Administrator (OMSA) on Ubuntu

Sysadmin

Dell OpenManage Server Administrator (OMSA) is a Dell utility to monitor your Dell servers. Here is how to install and use OMSA on a Ubuntu server...

Read
Bpost Android Malware

Android

Recently, a lot of people received several text messages about a parcel delivered by Bpost. The message asks you to click on a link. Of course, this text message is a spam and most of the recent Android devices classify this message in a Spam section automatically. However, because a lot of people are ordering on the Internet, this message could seem legitimate.

Read
Run your Laravel application on Kubernetes

Kubernetes Laravel

In this blog post series we will present how to deploy a Laravel app on Kubernetes. In this first tutorial, we start with a simple setup, and leave horizontal scaling and high-availability for a follow-up post...

Read
Laravel Custom Logging

Laravel PHP

For the majority of developed program, it is necessary to use a robust and efficient Log mechanism. It is of course the case for a web interface. It is important to be able to track potential bugs or issues.

Read
Multi-tenant Kubernetes cluster : namespace, quota and kubectl user

Kubernetes

When multiple users must use the same kubernetes cluster, a good practice consists in segregating them in isolated namespaces. In this tutorial we show how to create a namespace, apply quotas so the user cannot exhaust the resources (memory and cpu) of the cluster, and create a dedicated kubectl user.

Read
Add users to a group in Nextcloud

Nextcloud

If you are administrator of a group in Nextcloud, you have the possibility to create accounts yourself, and to add these new users to your group. Doing so, they will have access to all folders shared with the group. Here is a step-by-step example.

Read
Collecting data with Filebeat

Monitoring APT Detection

In modern network infrastructures, there are a lot of sources of data, that can be of interest for collection and analysis, to see if possible suspicious activity is present in the network. More often than not, this data is collected and send to a Security Information and Event Management (SIEM) tool, running on the network, where it can be processed and reviewed by domain specialists.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept