• Skip to main navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Hacking & CTF
  • SysAd and SecuritySystems Administration (SysAd) and Digital Security are two huge categories that are both hugely important in the modern world. SysAd ranges from compiling modules, configuring Apache webserver, updating servers and networking remote computers. Digital security, one of the most interesting aspects of the digital world, will see topics for everything from configuring firewalls, detecting security breaches, handling exploits, calculating risk and detecting threat vectors. I’m hugely interested in SysAd and security, as I see them both as critical aspects of entire businesses. Both SysAd and Security Individuals are in a constant arms race with malicious users and automated bot nets. As new tools to protect servers and systems are produced and rolled out, new ways to circumvent them are developed. As hackers find new ways to breach systems and services, security aficionados and clued up  system administrators patch, program and research their ways back to securer grounds.
  • Linux
  • Raspberry Pi
  • Programming
  • Contact Me & Privacy Policy
  • Skip to menu toggle button

Coder, Hacker, SysAd & Forensic Investigator

A blog from a forensic investigator, ethical hacker and programmer

Tag: webdev

Web development covers both the coding side and the theoretical aspects. Web development, for me at least, is largely PHP driven. PHP is supported behind the scenes with MySQL for data storage and jQuery/CSS for frontend work. Frameworks are of course helpful in many scenarios, this have included but are not limited to Laravel and Zend. CSS is nicely extended by the rather powerful LESS.

Shared Hosting > Leverage Browser Caching

We all know that faster websites are better websites. Not necessarily better quality, as the Internet is full of drivel,…
Continue reading “Shared Hosting > Leverage Browser Caching”…
Posted on: September 5, 2013 Last updated on: October 5, 2016 Comments: 1 Written by: Paul Joyce

Checking if an element is hidden with jQuery – the correct method

Over the last couple of days I’ve been reviewing code submitted by other programmers for an external project. Two of…
Continue reading “Checking if an element is hidden with jQuery – the correct method”…
Posted on: July 16, 2013 Last updated on: July 16, 2013 Comments: 2 Written by: Paul Joyce

Secure those WordPress 3.5.1 exploits

Yesterday WordPress released version 3.5.2 of its famous blogging platform, patching many WordPress 3.5.1 vulnerabilities and exploits, but is it…
Continue reading “Secure those WordPress 3.5.1 exploits”…
Posted on: June 22, 2013 Last updated on: October 7, 2016 Comments: 0 Written by: Paul Joyce

Broken WP dashboard and stats panel

Another week has gone by and another post needs to be written to explain why some people are probably seeing…
Continue reading “Broken WP dashboard and stats panel”…
Posted on: April 27, 2013 Last updated on: April 27, 2013 Comments: 1 Written by: Paul Joyce

How to secure WordPress: 4 tips to help lock it down

With the recent spate of brute force attacks hitting WordPress installations around the world, its not surprising that hosting companies…
Continue reading “How to secure WordPress: 4 tips to help lock it down”…
Posted on: April 17, 2013 Last updated on: October 19, 2016 Comments: 3 Written by: Paul Joyce

Suspicious www.webhostingstatus.com popup for WordPress Admins

Like me you’ve probably seen a lot of activity in the media recently about WordPress being targeted by hackers for…
Continue reading “Suspicious www.webhostingstatus.com popup for WordPress Admins”…
Posted on: April 13, 2013 Last updated on: April 17, 2013 Comments: 7 Written by: Paul Joyce

How to order and group custom WordPress posts by their custom taxonomies

Working on a project for a client, I needed to group an archive of custom post types by their categories.…
Continue reading “How to order and group custom WordPress posts by their custom taxonomies”…
Posted on: January 26, 2013 Last updated on: January 26, 2013 Comments: 0 Written by: Paul Joyce

Whats new in WordPress 3.5

This week we finally got our hands on version 3.5 of the WordPress CMS. It was way back in the…
Continue reading “Whats new in WordPress 3.5”…
Posted on: December 14, 2012 Last updated on: December 14, 2012 Comments: 0 Written by: Paul Joyce
Font Rendering

Font Rendering Explained

One aspect of web design that still limits everyday, is the horrendously poor choice of fonts we have at our…
Continue reading “Font Rendering Explained”…
Posted on: December 4, 2012 Last updated on: December 4, 2012 Comments: 0 Written by: Paul Joyce
LESS: Programmable Stylesheets

Learning LESS: Nesting Rules

So you’ve managed to complete the simple LESS setup, written a few variable declarations, even used some of the built…
Continue reading “Learning LESS: Nesting Rules”…
Posted on: December 4, 2012 Last updated on: November 28, 2012 Comments: 0 Written by: Paul Joyce
1 2 Next page »

Recent Posts

  • Reverse Shell Stabilisation
    Below is one example of how to stabilise a reverse-shell. What are the benefits of a reverse-shell: Makes using text…
    Continue reading “Reverse Shell Stabilisation”…
  • log4j Exploit – Solar CTF
    Last year, CVE-2021-44228 was discovered and it rocked the IT world. The vulnerability was found in logging software, log4j, and…
    Continue reading “log4j Exploit – Solar CTF”…
  • THM – Revenge CTF Room
    Todays Capture the Flag hacking writeup is for the TryHackMe room, Revenge. It’s a medium rated room with the following…
    Continue reading “THM – Revenge CTF Room”…
  • AoC3#19: Something Phishy Is Going On
    With the completion of the last 18 days worth of Advent of Cyber challenges, I’m now starting on the blue-teaming…
    Continue reading “AoC3#19: Something Phishy Is Going On”…
  • AoC3#18: Playing With Containers
    Our first half of the cloud challenges saw us meddling with Amazon’s AWS buckets and the AWSCLI. I found that…
    Continue reading “AoC3#18: Playing With Containers”…

Posts Tags

Advent of Cyber 2021 chrome cli CSS ddos dos facebook filezilla ftp Hacking Challenge Writeup IDOR Exploit IE IE6-7 IE8 IE9 JohnTheRipper jQuery LESS linux linux mint netcat network nmap oneiric ocelot PicoCTF precise pangolin Privilege Escalation Python rant Raspberry Pi RCE - Remote Code Execution reverse shell security SQL Injection SSH sysad thunderbird TryHackMe ubuntu webdev Web Exploitation wifi windows Windows Box Exploitation wordpress

Recent Posts

  • Reverse Shell Stabilisation
    Below is one example of how to stabilise a reverse-shell. What are the benefits of a reverse-shell: Makes using text…
    Continue reading “Reverse Shell Stabilisation”…
  • log4j Exploit – Solar CTF
    Last year, CVE-2021-44228 was discovered and it rocked the IT world. The vulnerability was found in logging software, log4j, and…
    Continue reading “log4j Exploit – Solar CTF”…
  • THM – Revenge CTF Room
    Todays Capture the Flag hacking writeup is for the TryHackMe room, Revenge. It’s a medium rated room with the following…
    Continue reading “THM – Revenge CTF Room”…
  • AoC3#19: Something Phishy Is Going On
    With the completion of the last 18 days worth of Advent of Cyber challenges, I’m now starting on the blue-teaming…
    Continue reading “AoC3#19: Something Phishy Is Going On”…
  • AoC3#18: Playing With Containers
    Our first half of the cloud challenges saw us meddling with Amazon’s AWS buckets and the AWSCLI. I found that…
    Continue reading “AoC3#18: Playing With Containers”…

Top Posts

  • RipperX not encoding MP3s
  • What is a UDP Flood Attack (DoS)

My Site = My Rules!

Similar to if you were in my house, this is my site and my rules. If you don't like what you read or see on here then you are more than free to leave and explore the many wonders of the virtual world.

Conversely just because somethings on my site doesn't necessary mean I wrote it, or believe it, or agree with it. Regardless if its got my name above, below or signed straight through the middle of it.

Also I may change this site at any time.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy