
The first part of this series on securing a LAMP server setup focused on hardening Apache (the popular web server) this article will focus on securing both MySQL and PHP. This is a fairly straight forward process and should be … Continue reading
The first part of this series on securing a LAMP server setup focused on hardening Apache (the popular web server) this article will focus on securing both MySQL and PHP. This is a fairly straight forward process and should be … Continue reading
Weather you are just starting out and want some basic tips or you have run a server for a while there comes a point when you realise a need for security on it, by default a lot of configurations are … Continue reading
So you want to use your android device as a penetration testing platform. Maybe pulling a laptop out and hacking away is too obvious and you need to be a bit more surreptitious. You might just want to impress your … Continue reading
Ok, so you’ve decided your interested in security or some aspect of it but are unsure how to get started, where to look, if it’s really the right thing for you. Like me you probably want to jump straight in … Continue reading
As I’m guessing a lot of people are awear a law has passed in the uk blocking access to the website thepiratebay, arguably the most popular BitTorrent tracker on the internet. I am with BT and I now get the … Continue reading
The life-cycle of creating a website from scratch is not an exact science, it varies from site to site, it is different for each persons requirements, sometimes different parts take longer than others, focus is constantly changing and it’s nonlinear … Continue reading
I am pro self-study… Here hopefully will explain that. Not only why I am, but also how you can learn computer security at home, for minimal cost. Firstly the why – it’s time to focus on some negatives. Cost – … Continue reading
This is by no means an in-depth article on exploit types, or any information on a specific application, but more a quick guide on the methodology I generally use. There are hundreds of articles on various exploit techniques for various … Continue reading
Hello there everyone. as the title states, this is indeed a new blog… not only that! but this is the first post in this new blog!… ohhh exciting 😀 I guess you may have some questions. feel free to ask … Continue reading