Face Finder Online logo
Mobile menu open
WEB APPS CYBER SECURITY ABOUT BLOG CONTACT

Blog


This blog is designed to give an insight into latest projects and the tech news that Web Loft believes to be relevant to the world of Web application and prototyping technologies.

Facial Recognition Software testing using WPF UI

Facefinder.Online & Facial Recognition Software

Using open source images for this test the Facial Recognition element of the EmguCV library proved very effective at matching faces from a large collection of publicly available images from open source websites. Further testing was carried out using a live video feed and again the system proved to be excellent at identifying faces from the live video stream from a database of stored facial images. There are many other image processing and identification libraries in the EmguCV library package. The number plate recognition library was also tested and this proved again to be highly effective at picking out vehicles from a stored collection of number plate images. Obviously the functionality provided by the EmguCV library has a wide variety of use cases and applications.

Introducing FunnelwebBox

Funnelweb is our own network of propriety passive cyber security threat listeners that record potential vulnerability reconnaissance, port scans and potential attacks for analysis and intelligence gathering. This raw intelligence data gathered by Funnelweb is used to provide IP address reputation reports and targeted intelligence on potential cyber security threats and vulnerabilities on both your internet and network surface footprint. Used in conjunction with our propriety network sniffers, that monitor in real-time your network traffic, intelligence gathered by Funnelweb can also provide real-time alerts of malevolent IP addresses, vulnerability reconnaissance, port scans and potential attacks that are present on your network. Please contact us for more information and how we can help you protect your business from cyber security attacks. Have you wanted to know who tried to hack you or if that IP address in your logs has tried port scanning or attempted cyber attacks in the UK? Try our FREE ip lookup and get a FREE threat intelligence report on an ip address. FunnelWeb Box is a physical implementation of own passive cyber security threat listeners that record potential vulnerability reconnaissance, port scans and potential attacks. It is easy to install and get running quickly of your own network. The data gathered by FunnelWeb Box can be easily interpreted in real-time using the easy to use user friendly dashboard and reports. FunnelWeb Box also provides real-time alerts of malevolent IP addresses, vulnerability reconnaissance, port scans and has a built in Intrusion Detection System (IDS). Please contact us for more information and how we can help you protect your business from cyber security attacks. Read more...


Kubernetes Persistent Volumes

In this blog post, I’ll be walking through a simple example of how to create a persistent volume in Kubernetes. There are several volume types in Kubernetes, but to get started I’ll be using the local volume type. A local volume represents a mounted local storage device such as a disk, partition or directory. I’ll be using a single node Kubernetes cluster running within Ubuntu server and using a docker image of a .Net Core WebAPI application that uses the persistent volume to write logs to. Below are them main steps needed to achive this goal, it assumed that you have knowledge of creating the .Net Core appliation and the Kubernetes single node cluster. Read more...

Installng SSL Certificates on Apache2 using OpenSSL

In this blog post, you can learn how to generate a CSR prior to acquiring your SSL certificates and how to later install them successfully on Apache2 web server.

To activate an SSL certificate you need to submit a CSR (Certificate Signing Request) on our site. CSR is a block of code with encrypted information about your company and domain name. Usually CSR openssl configuration contains by default the details as follows below:
  • Common Name (the domain name certificate should be issued for)
  • Country (two-letter code)
  • State (or province)
  • Locality (or city)
  • Organization
  • Organizational Unit (Department)
  • E-mail address
Read more...

Azure DevOps CI/CD

In this blog post, you can learn how to generate create a continuous integration release pipeline (CI) and deploy the published build to a Azure Webapp using continuous deployment (CD). The default VS2019 .Net Core WebAPI 'WeatherForecast' service is used In this example. As a prerequisite you need to upload the source code to an Azure Devops repo. Read more...

Tech stack: Microsoft, Azure, DevOps, .Net Core, Webapp.

Geotracker.org.uk Web Application

Geotracker.org.uk Web Application

The Geotracker.org.uk web application is launched. Using this web application fleet and vehicle data is easy to interpret using Geotracker's dashboard of charts and graphs that make trends easy to spot and analysis a simple task. Vehicle journey speed and event data is easy to interpret using Geotracker's journey event chart and journey speed graph. Event location can be viewed on Google Maps by clicking on the event icon in the journey event chart. Fleet and vehicle monthly mileage data is easy to interpret using Geotracker's monthly mileage graphs that make trends easy to spot and analysis a simple task. The Geotracker.org.uk web application allows fleet and vehicle journey cluster data to be easily interpreted using journey cluster maps that make trends easy to spot and analysis a simple task. The fleet and vehicle event frequency data is easy to interpret using Geotracker's fleet and vehicle event matrix that makes trends easy to spot and analysis a simple task. Event locations can be viewed on Google Maps by clicking on a day of the month on the fleet and vehicle event matrix chart. Read more...


What is bot traffic and how to detect bot threats?

Bot traffic refers to automated software applications, known as bots, that visit websites or use online services. Bots can be beneficial, like search engine crawlers or harmful, such as those used for scraping data or launching DDoS attacks. Businesses need to understand and detect bot traffic to protect their resources and maintain the integrity of their online operations. Read more...

Web Loft logo
Mobile menu close