Posts by admin

Continuous Crypto: Token Sale Startup Weekend

April 16th, 2018 Posted by Blockchain, Blog 0 thoughts on “Continuous Crypto: Token Sale Startup Weekend”

Continuous is exploring Token Sale bridging between cryptocurrencies and consumer apps and will be doing an internal Startup weekend the 20/21/22 July in Houffalize Belgium.

The Continuous Team will work during the week-end on identifying a Business Model based on a Token Economy.

We are looking for more Team mates to complete the Team (Designer/Ethereum developer, Legal, …).
If you don’t have these skills but you are a Crypto enthusiast you are welcome to join the Team too!

Be quick as places are counted!

We have a nice big house with Sauna for the whole weekend with BBQ and beers ūüôā

Contact: oswald at continuous . lu

DevOps Fundamentals Training Course in Luxembourg April Session

April 3rd, 2018 Posted by Blog 0 thoughts on “DevOps Fundamentals Training Course in Luxembourg April Session”

Continuous is giving a DevOps Fundamentals Training Course in Luxembourg the 23 and 24 April!

Only a few seats are available please call +352 671024362 to get more informations and reserve your seat.

Continuous Delivery Deployment

HIVE Blockchain Society: Game Theory & Consensus Mechanisms

March 26th, 2018 Posted by Blog, Events 0 thoughts on “HIVE Blockchain Society: Game Theory & Consensus Mechanisms”

Continuous was at the HIVE Blockchain Society Event in Brussels the 24 march 2017.

The HIVE is a community for Blockchain enthusiasts and experts (developers, investors, entrepreneurs, etc.) starting a series of initiatives to promote Blockchain as outlined as below:

The program of this event was very interesting with a presentation of Game Theory & Consensus Mechanisms followed by very interesting projects show cases.

The program was:

  • Game Theory & Consensus Mechanisms: Dr Jamsheed Shorish, an experienced university teacher with a background in computational finances & mathematics has been talking about game theory, what impact it has on our daily lives and how it can be applied to rule consensus mechanisms.
     
  • Decred Decentralised Autonomous Crypto currency.
    Since 2016, Decred has striven to solve blockchain governance. Their innovative, hybrid proof-of-work/proof-of-stake consensus voting system empowers stakeholders and allows for the seamless transition from one set of rules to another. 
  • Giveth is a Decentralized Altruistic Community (DAC). The team‚Äôs drive is defined as supporting transparency, open-source development, co-creation, and collaboration. The Giveth community is building a software system, using Ethereum smart contracts, that will radically shift the way people think charity can and should work.
     

In summary, this was a fantastic day meeting many very interesting people! Looking forward for more HIVE meet-up!

Continuous Team Event 2018

February 9th, 2018 Posted by Blog, Events 0 thoughts on “Continuous Team Event 2018”

Nothing else than a great Team Event to¬†reward the Team for their hard work! What happens in Cologne stays in Cologne ūüôā

 

Continuous Luxembourg & Belgium Celebration 2017

February 9th, 2018 Posted by Blog, Events 0 thoughts on “Continuous Luxembourg & Belgium Celebration 2017”

Following our Paris Continuous Cocktail it was time to celebrate Luxembourg & Belgium Customers!

 

Continuous Paris Celebration 2017

December 20th, 2017 Posted by Blog, Events 0 thoughts on “Continuous Paris Celebration 2017”

It was another great year for Continuous and it was time to celebrate it with a Continuous Cocktail for our Paris Customers!

Looking forward for the coming Cocktail in Luxembourg and Belgium!

 

 

Amazon Aurora relational database engine

September 14th, 2017 Posted by Blog, DevOps 0 thoughts on “Amazon Aurora relational database engine”

Today Pierre Tomasina has presented the Amazon Aurora relational database engine, a fully managed, MySQL-compatible, relational database engine that combines the speed and reliability of high-end commercial databases with the simplicity and cost-effectiveness of open-source databases. It delivers up to five times the performance of MySQL without requiring changes to most of your existing applications.

Visit the AWS User Group Luxembourg meet-up group for more coming talks.

Or if you rather prefer discussing about DevOps around a fresh beverage, check when is the next DevOps Café Luxembourg!

Continuous is now a Registered Education Partner of the DevOps Institute

September 4th, 2017 Posted by Blog, DevOps 0 thoughts on “Continuous is now a Registered Education Partner of the DevOps Institute”

Continuous is now a Registered Education Partner of the DevOps Institute!

The DevOps Institute (DOI) is the global learning community around emerging DevOps practices.   

Working with recognized thought leaders and the strategic examination partner PEOPLECERT, the DevOps Institute is setting the quality standard for DevOps competency-based qualifications.

Continuous provides through the DOI several certification courses: an introductory DevOps Foundation course as well as an entire series of DevOps Practitioner courses that are geared toward modern IT roles:

  • DevOps Foundation
  • Certified Agile Service Manager
  • Certified Agile Process Owner
  • DevOps Test Engineering
  • Continuous Delivery Architecture
  • DevOps¬†Leader
  • DevSecOps¬†Engineering

 
The DOI board consists of thought leaders within the DevOps community like Gene Kim, author of the highly recommended book the Phoenix Project, as well as the larger IT training community.

If you are starting a DevOps transformation, contact us to start on a solid ground with our quality training and certification courses in French, English or German!

 

Continuous is now an AWS Consulting and Reseller Partner!

August 7th, 2017 Posted by Blog, DevOps 0 thoughts on “Continuous is now an AWS Consulting and Reseller Partner!”

We are proud to announce that Continuous is now an AWS Consulting and Reseller Partner!

With more than 4 years of extensive experience on Amazon Web Services, we support and accelerate our customers and partners with their Cloud critical infrastructure.

We have worked with startups and large organizations on:

  • Highly Scalable / High Availability infrastructure
  • DevOps Automation/Tool Chains
  • Disaster Recovery Solutions
  • IoT (including Hardware)
  • API Gateways
  • Serverless Apps

 
As a AWS reseller, we are now able to provide you a complete solution supporting your entire value stream with one point of contact. Don’t hesitate to contact us to know what we can do for you!

 

WannaCry vulnerability detection with Metasploit

May 22nd, 2017 Posted by Blog, DevOps 0 thoughts on “WannaCry vulnerability detection with Metasploit”

Follow the instruction to install metasploit or create a Kali Linux Virtual Machine.

Let’s start the metasploit console.

msfconsole
=[ metasploit v4.14.17-dev                         ]
+ --- --=[ 1648 exploits -- 946 auxiliary -- 293 post        ]
+ --- --=[ 486 payloads -- 40 encoders -- 9 nops             ]
+ --- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]

Then scan our network to identify hosts with db_nmap to run an Nmap against our targets and our scan results will be stored automatically in our metasploit database.

msf > db_nmap -v -A 192.168.99.0/24
[*] Nmap: Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-21 17:30 CEST
[*] Nmap: NSE: Loaded 143 scripts for scanning.
[*] Nmap: NSE: Script Pre-scanning.
[*] Nmap: Initiating NSE at 17:30
[*] Nmap: Completed NSE at 17:30, 0.00s elapsed
[*] Nmap: Initiating NSE at 17:30

Let’s look at the hosts found with the hosts command.

msf > hosts
Hosts
=====
address         name                os_name            os_flavor
-------         ----                -------            ---------
192.168.99.43  kali.local           Linux                      server
192.168.99.53  metasploitable.local Linux              8.04    server
192.168.99.54                       Microsoft Windows  8       client
192.168.99.55                       Windows 10                 client
192.168.99.66                       Mac OS X           10.7.X  device

Let’s use the auxiliary scanner MS17-010 SMB vulnerability

msf > use auxiliary/scanner/smb/smb_ms17_010

Let’s see the options of the scan.

msf auxiliary(smb_ms17_010) > show options
Module options (auxiliary/scanner/smb/smb_ms17_010):
Name       Current Setting  Required  Description
----       ---------------  --------  -----------
RHOSTS                      yes       The target address range or CIDR identifier
RPORT      445              yes       The SMB service port (TCP)
SMBDomain  .                no        The Windows domain to use for authentication
SMBPass                     no        The password for the specified username
SMBUser                     no        The username to authenticate as
THREADS    1                yes       The number of concurrent threads

As we can see the RHOSTS option is required, let’s set it with our windows hosts IPs

msf auxiliary(smb_ms17_010) > set RHOSTS 192.168.99.55, 192.168.99.54
RHOSTS => 192.168.99.55, 192.168.99.54

Let’s run the scan

msf auxiliary(smb_ms17_010) > run
[-] 192.168.99.55:445    -- Host does NOT appear vulnerable.
[*] Scanned 1 of 2 hosts (50% complete)
[+] 192.168.99.54:445    -- Host is likely VULNERABLE to MS17-010!  (Windows 10 Enterprise Evaluation 14393)
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed

One of our windows host is vulnerable!

Continuous S.A.
11 boulevard du Jazz
L-4370 Belvaux
Luxembourg

© Continuous S.A. 2017