Kubernetes is a complex beast, with lots of available drivers and plugins to handle different types of clusters. For example, to handle networking between pods in the cluster, you must install a CNI (Container Network Interface) plugin like Flannel, Calico, Weave Net, Cilium or other. To handle storage and volumes, you can install one of multiple CSI (Container Storage Interface) plugins like CephFS, GlusterFS, Google Cloud Storage etc. In this blog post we show how to use MicroK8s to simplify the installation process.
ReadThe example below provides some sound configuration parameters for Apache, to help protect your web application. These values can naturally be tweaked for your particular app.
ReadWe are currently organizing coaching sessions in preparation for the Cyber Security Challenge that will take place in March. Students from the Royal Military Academy and from Molengeek are participating. Check the publication on BelDefNews...
ReadLoki is a log database developed by Grafana Labs. It is similar to Elasticsearch, with some major conceptual differences:
Read2-factor authentication is an important protection for a web application. In this blog post we see how Time based One Time Password (TOTP) authentication works, and how it can be implemented in a Laravel application...
ReadIn the first part of Mitre Att&ck in Practice, the Att&ck Navigator and the Atomic Red Team were presented. The Navigator allows to interact with the Att&ck Matrix in a very flexible way. The Atomic Red Team (ART) is a collection of code snippets designed to actually carry out Techniques. The link between an Att&ck Technique and the ART is easily done via the Technique IDs.
ReadA Raspberry Pi is a fabulous computer card. It is possible to use it as a Retro Gaming emulator, a media centre, or a home automation box,... It is also widely used for educational purposes: learn programming, run a small webserver, use it as an access point. It is widely used in network laboratory purposes.
ReadMost people using kali won't use it on a dedicated machine. For Windows users most would use kali from WSL (Windows Subsystem for Linux). Other would use a virtual machine in VirtualBox or other virtualization environment. In this post we will only cover VirtualBox. In this case it can be useful to have a folder on the host machine that can be shared in the kali environment.
ReadThis week we are presenting 3 papers at Digilience 2022, the conference on digital transformation, cybersecurity and resilience, in Plovdiv (Bulgaria):
ReadWe present a discussion on the use of the C and the Python languages and the use of Python calling a C library. Some arguments are general while others arise from the specific application of modifying a .csv (text) file.
ReadWhatever the reason you would like to call C functions from Python, one approach is presented here and consists in creating a C dynamic library, compiled as a .so module and accessing the library thanks to the ctypes package of Python. Explanations are given step by step and stand for a Linux environment (tested with Ubuntu20.04).
Read