Categories
Computing SysAd and Security

What is a UDP Flood Attack (DoS)

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis that UDP connections are stateless. We recently discussed about TCP SYN attacks being used to DoS targets; now we’re talking about UDP which doesn’t work on the 3 way handshake of TCP. One benefit of […]

Categories
Computing Linux SysAd and Security

How to do Port Scanning with Nmap

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system administrators should know about this tool, its very helpful in debugging certain networking problems. It is however predominantly […]

Categories
Computing SysAd and Security

Vulnerability Scanners Vs Penetration Tester

While browsing forums and articles it seems there’s some confusion over the distinction between vulnerability scanners and penetration testers. What do these two digital security roles have in common, where do they overlap and where do they differ. Vulnerability scanners and penetration testers should both have written or implied permission to perform both of their […]

Categories
Computing SysAd and Security

Explaining Denial of Service Attacks

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Categories
Computing Linux SysAd and Security

How to use Linux’s Traceroute (3 Examples)

Connections over a network often need debugging but due to the nature of the networking-beast, the actual topography of the network may be unknown. Connections are usually perceived as going from A to B, for example your desktop computer connects to Amazons website. To help expose the exact topography of a network we can use […]

Categories
Computing Linux Raspberry Pi SysAd and Security

Raspberry Pi Day3: Configuring and connecting securely and remotely with SSH

The other day I managed to mount the Raspberry Pi OS image onto an SD card and the Pi had its first taste of life. Now I’m going to attempt to set-up remote secure connections to the Pi so I can do away with the keyboard, mouse and monitor attached to the experimental hobby PC. […]

Categories
Computing Fixes & Solutions SysAd and Security

Linux: Changing your password from the CLI

We all know that passwords are some of the most important pieces of information we have to remember, but on top of that we’re told we should change them regularly. This is all well and good, but do you know how to change your Linux password when you can’t get into the X windows manager? […]

Categories
Computing Fixes & Solutions Social Media SysAd and Security

Secure those WordPress 3.5.1 exploits

Yesterday WordPress released version 3.5.2 of its famous blogging platform, patching many WordPress 3.5.1 vulnerabilities and exploits, but is it really worth the hassle of upgrading? I mean we all have better things to do at the weekend than go around fixing WordPress. Don’t even get started on those Monday mornings either! Well first off […]

Categories
Computing Web Design

Broken WP dashboard and stats panel

Another week has gone by and another post needs to be written to explain why some people are probably seeing errors on their WordPress dashboard. Having trouble seeing your site stats from Jetpack, or being asked “Are you human?” … likelihood is your suffering the same Heart Internet ‘problems’ I am. Have you recently started seeing this […]

Categories
Computing Fixes & Solutions Web Design

How to secure WordPress: 4 tips to help lock it down

With the recent spate of brute force attacks hitting WordPress installations around the world, its not surprising that hosting companies such as Heart Internet have taken some steps in protecting its users, even if it does raise a few eyeborws. But what can we, as users of WordPress, do to help protect our own blogs or […]