
I guess firstly. Whats this about? well I like to take my current projects everywhere I can with me. I like to work where ever I can, if an idea comes to me, I want to be able to implement … Continue reading
I guess firstly. Whats this about? well I like to take my current projects everywhere I can with me. I like to work where ever I can, if an idea comes to me, I want to be able to implement … Continue reading
I have been asked to give a tour / demonstration on how I have set up my laptop. I use it for everyday use... web devolpment, social networking, security... it's not powerful enough for gaming but will do pretty much … Continue reading
SO as you can probably tell from the title, this will be a small tutorial on how to get the password for android devices, specifically if it has a gesture password (see image left of here) For this demonstration I … Continue reading
Malware is unfortunately far too common to ignore or be unaware of in this day and age. However I am still asked every now and then about how it works and the differences between terms. So this article should hopefully remedy some … Continue reading
So I watched this talk the other day. It’s a brilliant talk, the recording is a bit quiet and I would recommend turning up the volume to watch it. If you are interested in the human aspect of security it’s a … Continue reading
This is just going to be a list of some basic tools and things every web developer should be aware of at least and use if the need arises. Hopefully nothing too technical or difficult to understand. So without further … Continue reading
After a conversation with a friend who is also from a computer science background he seemed adamant that it was incredibly difficult to get web spiders to read and cache AJAX data. I disagreed with this and thought of various … Continue reading
Since I have gone over what I belive to be the merits of self-studying security, I have decided to go over some of the materials covered when trying to get certified in security, specifically the CEH (certified ethical hacker) Currently … Continue reading
It’s here, it’s finally ready, a starting point, something to use as a launchpad. I’ve finally finished the VM… ok well not finished, I’m hoping this will be an ongoing project, but now at least there is something to show … Continue reading
As you may tell from the title of this post, I have decided to start a “hardened server project”. what this means is, I have used the first 2 articles (securing a LAMP server) and have decided it would be … Continue reading
You should now have a greater understanding of security and the various fields, what you would like to pursue and learn further, what your interested in or not. You have probably got some contacts and a list of resources that … Continue reading
My laptop, as you may have guessed, is a Sony VAIO TZ series (specifically VGN-TZ31VN) Not a cheap piece of equipment, I got it on the same month as it was released. There are a lot of people that absolutely … Continue reading
The first part of this series on securing a LAMP server setup focused on hardening Apache (the popular web server) this article will focus on securing both MySQL and PHP. This is a fairly straight forward process and should be … Continue reading
Weather you are just starting out and want some basic tips or you have run a server for a while there comes a point when you realise a need for security on it, by default a lot of configurations are … Continue reading