I use Linux on a daily basis and absolutely love it. When it gets developed, Ubuntu is twice a year for example, you can always see improvements. That’s not to say there isn’t problems or bugs, there are, but then OS’ are horrendously complex systems. Most of these articles will be a mix of praise for Linux (Ubuntu and Mint usually) or solutions for some Linux problems I’ve bumped into.

How to do Port Scanning with Nmap

by Paul Joyce

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system administrators should know about this tool, its very helpful in debugging certain networking problems. It is however predominantly […]

Tags: , , , , , ,

How to remember the OSI 7 model in order

by Paul Joyce

Remembering the OSI 7 Model – Mnemonics The order that the different layers of the Open Systems Interconnection 7 model are found in matters hugely; needless to say you in certain IT roles you cant afford to forget where the data link layer occurs, or which layer comes before another, etc. Remembering the correct order […]

Tags: , ,

Information on Layers of the OSI-7 Model

by Paul Joyce

What is the OSI-7 model? The Open-System Intercommunication model describes how the network communication layers are distinct and separate from one another. There are a few different network layer models, however this article only talks about the OSI-7 model. The OSI-7 model breaks the communication layers as follows (The physical layer is called the bottom […]

Tags: , , ,

How to use Linux’s Traceroute (3 Examples)

by Paul Joyce

Connections over a network often need debugging but due to the nature of the networking-beast, the actual topography of the network may be unknown. Connections are usually perceived as going from A to B, for example your desktop computer connects to Amazons website. To help expose the exact topography of a network we can use […]

Tags: , , , , , ,

Raspberry Pi Day3: Configuring and connecting securely and remotely with SSH

by Paul Joyce

The other day I managed to mount the Raspberry Pi OS image onto an SD card and the Pi had its first taste of life. Now I’m going to attempt to set-up remote secure connections to the Pi so I can do away with the keyboard, mouse and monitor attached to the experimental hobby PC. […]

Tags: , , , ,

Raspberry Pi Day2: Setting it up

by Paul Joyce

So unlike most of the computer I’ve bought in the past, the Raspberry Pi doesn’t come with its own operating system pre-installed (which actually saves me the time of removing, what is usual, Microsoft Windows). In fact the reason you can’t just plug in the Pi and boot it up first time is that the […]

Tags: , ,

Chrome locking up with .pki/nssdb directory error

by Paul Joyce

After re-installing Ubuntu 12.04 back on my laptop I noticed that Google Chrome was quite unstable. I was using version 28.0.3, but every time I opened it up it asked if I wanted to set it as my default browser. Every time I clicked yes. Every time it failed to remember it when I came […]

Tags: , ,

Updating Chromium on Debian 6 (Squeeze)

by Paul Joyce

Switching between Ubuntu and Debian machines, you notice the benefits of both system OS’ quite quickly. The first major thing you’ll probably have noticed with Debian 6 (Squeeze) is that its bundled with Chromium. After a bit of use though, you’ll also notice how unstable Chromium is. Lots of web pages freezing up, tabs not […]

Tags: , , , ,

How to upgrade Ubuntu to 12.10 – Quetzal

by Paul Joyce

The Quantal Quetzal release date, 18th October 2012, has been and gone, which means we can all upgrade Ubuntu to version 12.10, whoop! Sadly being super busy with work I’ve only just got round to doing it. Quetzal is largely an update to tackle graphical user interface changes, such as iconography, typography and the menu […]

Tags: , , ,

Salting passwords – how & why?

by Paul Joyce

Our lives are now run by passwords. We’re forced to remember more passwords everyday it seems. How can developers secure passwords more securely? Why is salting passwords important and how does using salts improve the strength of stored passwords? Consider this; what happens if the online store you run is hacked and all your customers details lifted? Hopefully all […]

Tags: , , , ,

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+