Computer and Digital Security is one of the most important areas of any modern business. If network security is breached or IT processes and integrity not upheld, the whole company will be at risk. Network security breaches can expose confidential data, commercially sensitive information and trade secrets. IT security prevents denial of service to hackers, loss or corruption of data, PR nightmares and financial loss. On top of these potentially disastrous scenarios, IT security is a constantly changing field, so your finger must always be on its pulse. Failing to have the latest patches or releases will likely expose you to hackers and other criminals.

What is a UDP Flood Attack (DoS)

by Paul Joyce

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis that UDP connections are stateless. We recently discussed about TCP SYN attacks being used to DoS targets; now we’re talking about UDP which doesn’t work on the 3 way handshake of TCP. One benefit of […]

Tags: , , , ,

How to do Port Scanning with Nmap

by Paul Joyce

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system administrators should know about this tool, its very helpful in debugging certain networking problems. It is however predominantly […]

Tags: , , , , , ,

Vulnerability Scanners Vs Penetration Tester

by Paul Joyce

While browsing forums and articles it seems there’s some confusion over the distinction between vulnerability scanners and penetration testers. What do these two digital security roles have in common, where do they overlap and where do they differ. Vulnerability scanners and penetration testers should both have written or implied permission to perform both of their […]

Tags: ,

Explaining Denial of Service Attacks

by Paul Joyce

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Tags: , , , , ,

How to use Linux’s Traceroute (3 Examples)

by Paul Joyce

Connections over a network often need debugging but due to the nature of the networking-beast, the actual topography of the network may be unknown. Connections are usually perceived as going from A to B, for example your desktop computer connects to Amazons website. To help expose the exact topography of a network we can use […]

Tags: , , , , , ,

Raspberry Pi Day3: Configuring and connecting securely and remotely with SSH

by Paul Joyce

The other day I managed to mount the Raspberry Pi OS image onto an SD card and the Pi had its first taste of life. Now I’m going to attempt to set-up remote secure connections to the Pi so I can do away with the keyboard, mouse and monitor attached to the experimental hobby PC. […]

Tags: , , , ,

Linux: Changing your password from the CLI

by Paul Joyce

We all know that passwords are some of the most important pieces of information we have to remember, but on top of that we’re told we should change them regularly. This is all well and good, but do you know how to change your Linux password when you can’t get into the X windows manager? […]

Tags: , , , , ,

Secure those WordPress 3.5.1 exploits

by Paul Joyce

Yesterday WordPress released version 3.5.2 of its famous blogging platform, patching many WordPress 3.5.1 vulnerabilities and exploits, but is it really worth the hassle of upgrading? I mean we all have better things to do at the weekend than go around fixing WordPress. Don’t even get started on those Monday mornings either! Well first off […]

Tags: , ,

Broken WP dashboard and stats panel

by Paul Joyce

Another week has gone by and another post needs to be written to explain why some people are probably seeing errors on their WordPress dashboard. Having trouble seeing your site stats from Jetpack, or being asked “Are you human?” … likelihood is your suffering the same Heart Internet ‘problems’ I am. Have you recently started seeing this […]

Tags: , ,

How to secure WordPress: 4 tips to help lock it down

by Paul Joyce

With the recent spate of brute force attacks hitting WordPress installations around the world, its not surprising that hosting companies such as Heart Internet have taken some steps in protecting its users, even if it does raise a few eyeborws. But what can we, as users of WordPress, do to help protect our own blogs or […]

Tags: , ,

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+