Blog

Install and use Dell OpenManage Server Administrator (OMSA) on Ubuntu

Dell OpenManage Server Administrator (OMSA) is a Dell utility to monitor your Dell servers. Here is how to install and use OMSA on a Ubuntu server...

Read more
Bpost Android Malware

Recently, a lot of people received several text messages about a parcel delivered by Bpost. The message asks you to click on a link. Of course, this text message is a spam and most of the recent Android devices classify this message in a Spam section automatically. However, because a lot of people are ordering on the Internet, this message could seem legitimate.

Read more
Run your Laravel application on Kubernetes

In this blog post series we will present how to deploy a Laravel app on Kubernetes. In this first tutorial, we start with a simple setup, and leave horizontal scaling and high-availability for a follow-up post...

Read more
Laravel Custom Logging

For the majority of developed program, it is necessary to use a robust and efficient Log mechanism. It is of course the case for a web interface. It is important to be able to track potential bugs or issues.

Read more
Multi-tenant Kubernetes cluster : namespace, quota and kubectl user

When multiple users must use the same kubernetes cluster, a good practice consists in segregating them in isolated namespaces. In this tutorial we show how to create a namespace, apply quotas so the user cannot exhaust the resources (memory and cpu) of the cluster, and create a dedicated kubectl user.

Read more
Add users to a group in Nextcloud

If you are administrator of a group in Nextcloud, you have the possibility to create accounts yourself, and to add these new users to your group. Doing so, they will have access to all folders shared with the group. Here is a step-by-step example.

Read more
Collecting data with Filebeat

In modern network infrastructures, there are a lot of sources of data, that can be of interest for collection and analysis, to see if possible suspicious activity is present in the network. More often than not, this data is collected and send to a Security Information and Event Management (SIEM) tool, running on the network, where it can be processed and reviewed by domain specialists.

Read more
Create your own VM image for the Cyber Range

cyrange is a Cyber Range platform built on top of VirtualBox. It brings some some additional features to support education and training:

Read more
The ELK Stack and how to use it

Managing big networks can be quite complicated- many inbound and outbound requests, network traffic, email correspondence and other activities that need to be monitored. It is quite easy for an attacker to obfuscate his actions, when we are confronted with large amounts of network data to analyze. Luckily there are ways to aggregate all this data and store it so it can be reviewed and hopefully discover any abnormal activity. Of course, I am talking about the use of a Security Information and Event Management (SIEM) framework. One such framework that has gained a lot of popularity, because of its modularity and open-source nature, is the ElasticSearch/Logstash/Kibana framework.

Read more
Change the MAC address of your Linux system

Still today, some network monitoring tools and security systems rely on the MAC address of the host. However, a MAC address is not an authentication mechanism! It can be easily changed. More precisely, by default most operating systems will use the MAC address burnt into the network interface as the source MAC address for all emitted Ethernet frames. But you can easily reconfigure your system to change this behavior. Here is how to do that on a Linux computer.

Read more
Implementing email verification in Laravel

Have you ever wanted to ensure your users use email addresses they actually possess? Here is a quick way to achieve it. This tutorial assumes that you already have:

Read more
Training session GIT, GitLab and CI

We are organizing a new training session on git, GitLab and Continuous Integration (CI) for Python developers.

Read more
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept