Categories
Computing Fixes & Solutions SysAd and Security

What is a TCP SYN Flood Attack (DoS)

Today we’re looking at a specific type of DoS attack; the SYN flood denial of service attack. Although this type of attack can just as equally be performed as a DDoS attack, the examples we’ll use are for a standard single-source denial of service. A SYN-flood attack works by consuming resources on the targets machine […]

Categories
Computing SysAd and Security

Explaining Denial of Service Attacks

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Categories
Computing Linux SysAd and Security

Information on Layers of the OSI-7 Model

What is the OSI-7 model? The Open-System Intercommunication model describes how the network communication layers are distinct and separate from one another. There are a few different network layer models, however this article only talks about the OSI-7 model. The OSI-7 model breaks the communication layers as follows (The physical layer is called the bottom […]

Categories
Computing Linux SysAd and Security

How to use Linux’s Traceroute (3 Examples)

Connections over a network often need debugging but due to the nature of the networking-beast, the actual topography of the network may be unknown. Connections are usually perceived as going from A to B, for example your desktop computer connects to Amazons website. To help expose the exact topography of a network we can use […]

Categories
Computing Fixes & Solutions Programming Web Design

Shared Hosting > Leverage Browser Caching

We all know that faster websites are better websites. Not necessarily better quality, as the Internet is full of drivel, but Google and Bing love fast websites. If you can serve fast content, they’ve openly admitted you’ll do better in their search rankings. Better ranking means more readers/subscribers/buyers/moneys. It’s meant an improvement for this WordPress […]

Categories
Computing Linux Raspberry Pi SysAd and Security

Raspberry Pi Day3: Configuring and connecting securely and remotely with SSH

The other day I managed to mount the Raspberry Pi OS image onto an SD card and the Pi had its first taste of life. Now I’m going to attempt to set-up remote secure connections to the Pi so I can do away with the keyboard, mouse and monitor attached to the experimental hobby PC. […]

Categories
Computing Fixes & Solutions SysAd and Security

Linux: Changing your password from the CLI

We all know that passwords are some of the most important pieces of information we have to remember, but on top of that we’re told we should change them regularly. This is all well and good, but do you know how to change your Linux password when you can’t get into the X windows manager? […]

Categories
Computing Linux Raspberry Pi

Raspberry Pi Day2: Setting it up

So unlike most of the computer I’ve bought in the past, the Raspberry Pi doesn’t come with its own operating system pre-installed (which actually saves me the time of removing, what is usual, Microsoft Windows). In fact the reason you can’t just plug in the Pi and boot it up first time is that the […]

Categories
Computing Programming Raspberry Pi

Raspberry Pi Day1: Introduction (Model B)

So I finally bit the bullet and purchased a Raspberry Pi. I was hardly quick to jump on the bandwagon as the first model of the Pi came out in Feb last year (2012). I managed to get my hands on the model B version for only £30 from Amazon, quite a bargain even though […]

Categories
Computing Fixes & Solutions Linux

Chrome locking up with .pki/nssdb directory error

After re-installing Ubuntu 12.04 back on my laptop I noticed that Google Chrome was quite unstable. I was using version 28.0.3, but every time I opened it up it asked if I wanted to set it as my default browser. Every time I clicked yes. Every time it failed to remember it when I came […]