Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Methodology

  1. Home>
  2. Development>
  3. Methodology>
  4. Page 2
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

OS Detection Techniques

  • Post author:jonathansblog
  • Post published:July 14, 2019
  • Post category:jonathansblog/Methodology/Pentest
  • Post comments:0 Comments

Os Detection Techniques and OS fingerprinting https://www.youtube.com/watch?v=1zqsJSlPxpo Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os…

Continue ReadingOS Detection Techniques
Read more about the article service-oriented architecture and frameworks – SOA frameworks

service-oriented architecture and frameworks – SOA frameworks

  • Post author:jonathansblog
  • Post published:September 22, 2018
  • Post category:Methodology

service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…

Continue Readingservice-oriented architecture and frameworks – SOA frameworks
Read more about the article MSc Thesis

MSc Thesis

  • Post author:jonathansblog
  • Post published:May 13, 2016
  • Post category:Methodology/News/Pentest/SQL
  • Post comments:0 Comments

Ive completed my MSc Thesis! I was awarded a grade A (81%) and an MSc with distinction :D The abstract from my thesis is below: SQL injection vulnerabilities remain one…

Continue ReadingMSc Thesis
Read more about the article What is an sql injection attack

What is an sql injection attack

  • Post author:jonathansblog
  • Post published:May 5, 2015
  • Post category:Development/Kali Linux/Methodology/Pentest/SQL
  • Post comments:0 Comments

What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…

Continue ReadingWhat is an sql injection attack
Read more about the article 4 Layers in an SOA

4 Layers in an SOA

  • Post author:jonathansblog
  • Post published:January 10, 2015
  • Post category:Development/Methodology
  • Post comments:0 Comments

4 Layers in an SOA There are 4 layers in an SOA: Business Processes Business Services Integration Services Enterprise Resources Enterprise Resources existing applications COTS systems (consumer, off the shelf)…

Continue Reading4 Layers in an SOA
Read more about the article 4 types of service in an SOA system

4 types of service in an SOA system

  • Post author:jonathansblog
  • Post published:January 8, 2015
  • Post category:Development/Methodology
  • Post comments:0 Comments

4 types of service in an SOA system. Business services Domain services Integration services Foundation / Utility services Business Services Provide high-level functionality Provides abstraction of the interface Provides integration of…

Continue Reading4 types of service in an SOA system
Read more about the article Challenges of SOA / Comparison of SOA and traditional apps

Challenges of SOA / Comparison of SOA and traditional apps

  • Post author:jonathansblog
  • Post published:January 7, 2015
  • Post category:Development/Methodology
  • Post comments:0 Comments

Challenges of SOA / Comparison of SOA and traditional apps Traditional enterprise applications present themselves as islands of data, automation and security. Integration is needed because of the nature of…

Continue ReadingChallenges of SOA / Comparison of SOA and traditional apps
Read more about the article Characteristics of SOA Services

Characteristics of SOA Services

  • Post author:jonathansblog
  • Post published:January 7, 2015
  • Post category:Development/Methodology
  • Post comments:0 Comments

Characteristics of SOA services Granularity Size / Scope of service Encapsulation Separation of interface form implementation Modularity Business processes can be decomposed into services which can be decomposed into smaller…

Continue ReadingCharacteristics of SOA Services
Read more about the article Roles in SOA and their responsibilities

Roles in SOA and their responsibilities

  • Post author:jonathansblog
  • Post published:January 6, 2015
  • Post category:Development/Methodology
  • Post comments:0 Comments

There are 4 roles in SOA: Architecture team Business analysts Management / executive team Technical team (design / development)   Roles in SOA - Technical team (design / development) Answers…

Continue ReadingRoles in SOA and their responsibilities
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • Go to the next page

Latest Posts

  • A Guide to Open-WebUI: Using It with Ollama
  • How to install ollama and run deepseek
  • Operation Triangulation: Unraveling a Sophisticated Cyber Espionage Campaign
  • Digit Expo 2024
  • Modifying my guitar hardware
  • Mkcert on Laravel Homestead for trusted SSL certs
  • Bash & Zsh Command History Hacks: Say Goodbye to history | grep
  • WordPress Yoast add focus keywords to all posts without focus keywords
  • Configure azure notification hub for ios android and web
  • Azure static website hosting with blob storage and CDN
  • Azure Notification Hubs for push notifications in laravel and nextjs
  • How to block calls on your iphone
  • WildCard SSL certificates with Letsencrypt in Azure App-Service
  • Azure Wildcard Subdomains
  • New Guitar Day

Popular Posts

  • How to install ollama and run deepseek
  • DIY Skateboard Light
  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Ubuntu on the chuwi hi10 pro
  • Linux commands for networking with command line
  • Wapiti tutorial
  • Nikto tutorial for kali linux
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - WordPress Theme by OceanWP