background image
small-large-icon
Nomen Nescio

Contact Information:

E-mail: info [at] nomennesc.io PGP

Keywords:

free open source software, consultancy, analysis, hacking, training, ...

small-large-icon

Nomen Nescio

Nomen Nescio (Latin: I do not know the name) is the commercial venture of a human entity whose name shall remain unknown. Balancing between a desire to pursue personal interests and a need for income, Nomen Nescio is available for consultancy, systems and software architecture, development, implementation, and training.

Contact Information:

E-mail: info [at] nomennesc.io PGP

Key ID: 0x65383A62 - Key Fingerprint: 3000 FE56 DE77 551F B3BF CB8E 903A B149 6538 3A62

Contact Form

Your name:
Your organisation:
Your e-mail:
Your phone-no:
Message:


Nomen Nescio is based in the Netherlands and registered at the Chamber of Commerce, no. 30194361

small-large-icon

Security & Privacy

No sales pitch here. If you care about security and privacy, Nomen Nescio can assist with:
 * Training
 * Threat-modeling
 * Counter-surveillance
 * Auditing
 * Intrusion detection
 * Hardening
 * Forensics and emergency response
small-large-icon

Security & Privacy

“There is no single solution for keeping yourself safe online. Digital security isn't about which tools you use; rather, it's about understanding the threats you face and how you can counter those threats.” - Electronic Frontier Foundation

And that is why security trainings ought to start with threat-modeling. Identifying the threats you, your application, and/or your organisation face, what risks those threats pose, and where the priorities lie, leads the path towards implementing effective policies and mitigations. Such mitigations can range from very simple policies to in-depth technical means. As the security of the whole depends on the weakest link, both are generally of equal importance. Nomen Nescio offers:

 * Training - to raise awareness within your organisation, get accustomed to various security-related technologies, etc.
 * Threat-modeling - to analytically identify the threats you, your application, and/or your organisation face and how grave a risk those risks pose.
 * Counter-surveillance - mitigation against the threat of surveillance, both on a technical and policy level.
 * Auditing - testing the effectiveness of your security policies. Yes, i'd like to break into your systems :)
 * Intrusion detection - automated detection and mitigation of known attack vectors against your application.
 * Hardening - mostly technical mitigations to prevent successful attacks against your application.
 * Forensics and emergency response - helping you deal with security incidents and emergencies, analysing what has happened, cleaning up compromised systems, implementing emergency response mitigations to prevent further escalation, etcetera.

A reduced fee applies for NGO's and educational organisations.

small-large-icon

Research & Analysis

Abstract

Given the vast amount of information available online, gathering empirical data for scientific research has to a large degree become a process that can be automated, leading to larger datasets, higher statistical probability, and a reduced degree of bias in the gathering process. As such, hiring me to perform data-mining and -analysis can greatly improve the quality of your research.
small-large-icon

Research & Analysis

“It was a pleasure to work with [Nomen Nescio] on data-mining FreeBSD's software repository and analysing activity logs” - George Dafermos, TU Delft

Assisting George some years ago with his research on governance structures of free/open source software sparked my renewed interest in scientific research. Since then I've been amusing myself with various means of data-mining and -analysis, both for fun and for profit. Methods have included web-scraping, log-parsing, code-analysis, audio-analysis for bioacoustics, and natural language processing.

If you could use someone with both a strong technical skillset and a keen interest in the humanities and social sciences, please feel free to get in touch to discuss the options.

small-large-icon

Development

#include <stdio.h>
int main(){
 const char* l[]= {"C","Perl","assembler","bash","others"};
 int i;
 printf("I speak: ");
 for(i=0;i<(sizeof(l)/sizeof(l[0]))-1;i++) printf("%s, ",l[i]);
 printf("and %s.\n",l[i]);
 return 0;
}
small-large-icon

Development

#include <stdio.h>

int main(){
        const char* l[]= {"C","Perl","assembler","bash","others"};
        int i;
        printf("I speak: ");
        for(i=0;i<(sizeof(l)/sizeof(l[0]))-1;i++){
                printf("%s, ",l[i]);
        }
        printf("and %s.\n",l[i]);
        return 0;
}

... oh, I'm sorry, you're not a C compiler? Let me rephrase that in human terms:

Nomen Nescio is available for software development in languages such as C, C++, Perl, assembler, shellscripting, PHP, Java, Lua, Python, and anything similar. Modeling and architecture in UML or BPMN are also optional.

A reduced fee applies for GPL-licensed software.

small-large-icon

High Availability & Virtualisation

The five nines... now there's a challenge :)

Maintaining 99.999% uptime (that's only 5 minutes of downtime per year) is far from trivial and probably quite costly, but there's little that beats the fun of randomly pulling a plug in the datacenter to have all functionality continue as if nothing happened...

Keywords: Redundancy, Clustering, Keepalived, DRBD, Xen, Ceph, Heartbeat, HAProxy, etc.
small-large-icon

High Availability & Virtualisation

“Excellent knowledge with a broad spectrum of IT architecture, design and implementation of large scale virtual machine environments, bulletproof failover en load balancing IT infrastructures. Deep knowledge of mail, authentication methods and general IT services.” - Immanuel Derks, Translucent Systems

So yeah, I like to work with critical infra. There's a thrill to knowing that mistakes are not allowed. I'd be happy to help you with things like:

 * System and network architecture
 * Functional and technical documentation
 * Implementation
 * Testing procedures
 * Emergency recovery

Use of free open source software is (strongly) preferred. Experience with nearly all common open source high availability, storage, and virtualisation technologies.

small-large-icon

Identity & Access Management

                +------+    +----+
         +----->| LDAP |<-->| HR |
         |      +------+    +----+
  +--------------+   ^
  | provisioning |   |     +-----+
  +--------------+   +-----| IdP |
        |                  +-----+
        v                    ^
     +--------------+        |
     | applications |--------+
     +--------------+
small-large-icon

Identity & Access Management

Nomen Nescio is available for a variety of works in the IAM sphere, including:

 * Modeling business logic
 * Implementing automated workflows
 * Developing provisioning tools
 * Implementing Self-service portals
 * Setting up and managing authentication chains
 * Federation and Single-Sign-On
 * 2Factor authentication
 * Designing and implementing (Role Based) Access Control

As always, with a preference for solutions using free open source software, though I must admit some commercial products (NetIQ, in particular) are quite neat.