Blog

What is a genetic algorithm (and how does it work)?

In the Machine Learning field, there are plenty of different algorithms. Each algorithm has its own advantages and drawbacks, its domains of application and its performance. One of these algorithms we heard the most about is the Genetic Algorithm.

Read more
Email tracking techniques

Ever wondered how a company can track the opening of the emails it sends to its customers? Here you will learn to achieve that without using any third party email tracking service. All the techniques will be illustrated through Laravel code since all you need is a web server and a few scripts!

Read more
SMS-based 2-Factor Authentication is insecure !

The US National Institute of Standards and Technology (NIST) has declared in its Digital Authentication Guideline that SMS-based two-factor authentication should be banned due to security concerns [End of SMS-based 2-Factor Authentication; Yes, It's Insecure!]. We explain why in this blog.

Read more
ICONS2021 : Best paper award!

Our paper entitled Adversarial Training for Deep Learning-based Intrusion Detection Systems presented at the International Conference on Systesm (ICONS2021) has received the best paper award!

Read more
Detect unnecessary 'use' statements with PHP CodeSniffer

PHP Code Sniffer is a great tool to make sure your code is nicely written. Next to the default rules, you can also install and use additional rules (sniffs) to further enhance your code. Is here how to use PHPCS to detect (and remove) all unnecessary 'use' statements in your code.

Read more
MARk : add images to your detection reports

Since version 2.6.0, the Multi-Agent Ranking framework (MARk) offers the possibility to integrate images and other files in the reports generated by your detectors. Here is how...

Read more
Fixing "[circuit_breaking_exception] [parent] Data too large, data for [<http_request>]" ELK Stack error

Recently I have encountered an error I wasn't too familiar with how to resolve, working with the ELK Stack. This specific error is the "[circuit_breaking_exception] [parent] Data too large, data for [<http_request>]". It is not directly visible where the error originates from, but with some sleuthing I discovered that it is caused by Elasticsearch preventing some requests from executing to avoid possible out of memory errors, as detailed in Elasticsearch Circuit Breaker documentation.

Read more
GitLab : enable 2-Factor Authentication (2FA)

GitLab is a very powerful tool, and it also implements decent security measures and protections. But still, by default all your work on GitLab is protected by a single password, which could be guessed or stolen. To add an additional layer of protection, you can (and should) configure 2-Factor Authentication (2FA).

Read more
Packet Tracer : Getting started

In this video tutorial we show how to build a small network with Packet Tracer.

Read more
We are hiring (again)!

We are looking for a new colleague to help us with our teaching and research activities!

Read more
Record and share your terminal sessions with asciinema

If you want to share a terminal session, you can record a video of your terminal window, and share it on something like YouTube or vimeo. Or you can can use asciinema! asciinema actually only records the text input and output of your terminal (stdin, stdout and stderr). This means that the recordings are extremely light (it only contains text and timing), while the text remains perfectly readable. You can also easily share and embed your recordings on your website using some javascript code.

Read more
Testing with Selenium and PHPUnit

In this blog post we continue our series about testing a web application with Selenium. This time we will show how to integrate Selenium with PHPUnit tests and assertions.

Read more