System Administration (SysAd) seems to be a core part of my day, from my job down to my hobbies. Remotely managed cloud-based Linux SysAd keeps me busy with expose to both production and development clusters. While hobbying sees my SysAd skills used at the opposite end of the spectrum, working on individual Raspberry PI machines. Commercially system admin is integral with networking, environment admin, security, patching and monitoring.

How to do Port Scanning with Nmap

by Paul Joyce

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system administrators should know about this tool, its very helpful in debugging certain networking problems. It is however predominantly […]

Tags: , , , , , ,

Vulnerability Scanners Vs Penetration Tester

by Paul Joyce

While browsing forums and articles it seems there’s some confusion over the distinction between vulnerability scanners and penetration testers. What do these two digital security roles have in common, where do they overlap and where do they differ. Vulnerability scanners and penetration testers should both have written or implied permission to perform both of their […]

Tags: ,

How to remember the OSI 7 model in order

by Paul Joyce

Remembering the OSI 7 Model – Mnemonics The order that the different layers of the Open Systems Interconnection 7 model are found in matters hugely; needless to say you in certain IT roles you cant afford to forget where the data link layer occurs, or which layer comes before another, etc. Remembering the correct order […]

Tags: , ,

Explaining Denial of Service Attacks

by Paul Joyce

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Tags: , , , , ,

Information on Layers of the OSI-7 Model

by Paul Joyce

What is the OSI-7 model? The Open-System Intercommunication model describes how the network communication layers are distinct and separate from one another. There are a few different network layer models, however this article only talks about the OSI-7 model. The OSI-7 model breaks the communication layers as follows (The physical layer is called the bottom […]

Tags: , , ,

How to use Linux’s Traceroute (3 Examples)

by Paul Joyce

Connections over a network often need debugging but due to the nature of the networking-beast, the actual topography of the network may be unknown. Connections are usually perceived as going from A to B, for example your desktop computer connects to Amazons website. To help expose the exact topography of a network we can use […]

Tags: , , , , , ,

Shared Hosting > Leverage Browser Caching

by Paul Joyce

We all know that faster websites are better websites. Not necessarily better quality, as the Internet is full of drivel, but Google and Bing love fast websites. If you can serve fast content, they’ve openly admitted you’ll do better in their search rankings. Better ranking means more readers/subscribers/buyers/moneys. It’s meant an improvement for this WordPress […]

Tags: , , ,

Linux: Changing your password from the CLI

by Paul Joyce

We all know that passwords are some of the most important pieces of information we have to remember, but on top of that we’re told we should change them regularly. This is all well and good, but do you know how to change your Linux password when you can’t get into the X windows manager? […]

Tags: , , , , ,

Raspberry Pi Day2: Setting it up

by Paul Joyce

So unlike most of the computer I’ve bought in the past, the Raspberry Pi doesn’t come with its own operating system pre-installed (which actually saves me the time of removing, what is usual, Microsoft Windows). In fact the reason you can’t just plug in the Pi and boot it up first time is that the […]

Tags: , ,

MCrypt – Securing your Linux files with Twofish Cryptography

by Paul Joyce

With more and more details being stored on computers, it’s getting exponentially more important to keep them safe and secure. From internet banking to Facebook, renewing car tax to ordering presents on Amazon, you have entered a lot of data onto your computer. But how do you keep files of a sensitive nature secure?  Could something called […]

Tags: , , , , , , , ,

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+