You should now have a greater understanding of security and the various fields, what you would like to pursue and learn further, what your interested in or not. You have probably got some contacts and a list of resources that … Continue reading
You should now have a greater understanding of security and the various fields, what you would like to pursue and learn further, what your interested in or not. You have probably got some contacts and a list of resources that … Continue reading
My laptop, as you may have guessed, is a Sony VAIO TZ series (specifically VGN-TZ31VN) Not a cheap piece of equipment, I got it on the same month as it was released. There are a lot of people that absolutely … Continue reading
The first part of this series on securing a LAMP server setup focused on hardening Apache (the popular web server) this article will focus on securing both MySQL and PHP. This is a fairly straight forward process and should be … Continue reading
Weather you are just starting out and want some basic tips or you have run a server for a while there comes a point when you realise a need for security on it, by default a lot of configurations are … Continue reading
So you want to use your android device as a penetration testing platform. Maybe pulling a laptop out and hacking away is too obvious and you need to be a bit more surreptitious. You might just want to impress your … Continue reading
Ok, so you’ve decided your interested in security or some aspect of it but are unsure how to get started, where to look, if it’s really the right thing for you. Like me you probably want to jump straight in … Continue reading
As I’m guessing a lot of people are awear a law has passed in the uk blocking access to the website thepiratebay, arguably the most popular BitTorrent tracker on the internet. I am with BT and I now get the … Continue reading
The life-cycle of creating a website from scratch is not an exact science, it varies from site to site, it is different for each persons requirements, sometimes different parts take longer than others, focus is constantly changing and it’s nonlinear … Continue reading
I am pro self-study… Here hopefully will explain that. Not only why I am, but also how you can learn computer security at home, for minimal cost. Firstly the why – it’s time to focus on some negatives. Cost – … Continue reading
This is by no means an in-depth article on exploit types, or any information on a specific application, but more a quick guide on the methodology I generally use. There are hundreds of articles on various exploit techniques for various … Continue reading
Hello there everyone. as the title states, this is indeed a new blog… not only that! but this is the first post in this new blog!… ohhh exciting 😀 I guess you may have some questions. feel free to ask … Continue reading