Blog

Building Your Bash Toolkit: Getting Started

CSC bash Tools Bash-Toolkit

Welcome to the first installment of our series on developing your own set of Bash tools. For those who frequently work in the terminal, you'll understand the immense value in having a suite of custom tools tailored to your needs. This series aims to guide you in building that toolkit, ensuring you streamline and simplify those recurring actions in the terminal.

Read
Recovering deleted files with Foremost

Forensics Kali Linux

Sometimes it happens that files we did not want to delete are removed from the computer or external drives, or in the case of forensics analysis, we want to look for files that were previously on the system, but now are gone. Luckily, there are still ways to recover such data with relative ease!

Read
We are recruiting a Research Coordinator

Jobs

We are looking for a new colleague to help us manage research projects and researchers...

Read
Deploy smart contract to a local blockchain

Blockchain Smart Contract Ethereum

When starting to develop a smart contract it can sometimes be difficult and confusing how to deploy them and test them. You have the well known online tools like remix but sometimes you prefer to do stuff locally.

Read
Install a recent kernel on Ubuntu

Sysadmin Linux

Even if you are regularly updating your Ubuntu system, you may be running a relatively old version of the kernel. At the time of writing (28 August 2023), Ubuntu 22.04 ships with a kernel numbered 5.15.0, which was release on 31 October 2021. This is more than 2 years ago...

Read
Cyber Summer School

News

This week we are hosting the Cyber Summer School organized in collaboration with the Cyber Command.

Read
Changing Docker's default subnet IP range

Docker Linux Windows

Docker containers have become widely used to deploy and maintain critical parts of infrastructure. The problem is that sometimes some of the containers running may interfere with other parts of the network.

Read
Collaboration agreement between the Cyber Command and the Royal Military Academy

News

On June 26, a collaboration agreement has been signed between the Royal Military Academy and the Cyber Command for research projects within the framework of the DIRS (Defence, Industry and Research Strategy).

Read
Unit testing C code

C Secure Software Development

Writing unit tests is considered a good development habit for numerous reasons. Indeed, unit tests guarantee that the code works as expected, and they prevent developers from accidentally breaking things. Finally, they allow to see how the program is improving with each new commit, and they can be used as documentation to show how the program should be used by others. In this blog post, we show a simple way to implement unit tests when you are writing C code.

Read
RMA and Naval Group team up for Naval Cyber Security

News

Today representatives from the Royal Military Academy, Naval Group, Howest, NVISO and PR0PH3CY signed a partnership agreement to create the Naval Cyber Alliance.

Read
How to detect filtered (and opened) outgoing ports on a network?

Sysadmin Offensive Security

Sometimes you want to access services running on unusual ports, like a SSH server running on port 2222 for example. If connection fails, how can we detect the outgoing ports that are filtered or open on the network?

Read
Cyber Summer School

News

Our colleagues from the Cyber Command of Belgian Defense organize a Cyber Summer School. This training will give you the opportunity to spend five days with our cyber experts and to improve your cyber skills. And of course, they also have social activities planned to occupy your evenings!

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept