NCSC SME intro to cyber
As part of CYBERUK19 I'm attending a day of talks and workshops aimed towards the SME community The first is from the NCSC giving an overview of the threats to…
As part of CYBERUK19 I'm attending a day of talks and workshops aimed towards the SME community The first is from the NCSC giving an overview of the threats to…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…
Spidering a web application using website crawler software in kali linux There are lots of tools to spider a web application (an companies which are based on this tech, eg…
"A Coronal Mass Ejection has happened and the effects of that are expected to arrive later tomorrow evening" /me downloads skyview augmented reality star map and aurorawatch UK. Now looking…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
Installing and configuring the fail2ban centos service fail2ban is a service for linux systems that checks log files for failed login attempts and automatically inserts firewall rules to block further…
What is a WAF A WAF is a web application firewall. A Web Application Firewall protects HTTP applications (eg websites) using a set of rules to protect against various common…
Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…
This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…