Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Free

  1. Home>
  2. Blog>
  3. Free
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

OS Detection Techniques

  • Post author:jonathansblog
  • Post published:July 14, 2019
  • Post category:jonathansblog/Methodology/Pentest
  • Post comments:0 Comments

Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…

Continue ReadingOS Detection Techniques
Read more about the article NCSC Excercise in a box launch

NCSC Excercise in a box launch

  • Post author:jonathansblog
  • Post published:April 25, 2019
  • Post category:CYBERUK19
  • Post comments:0 Comments

Online tool to help you judge your cyber resilience and provide training The tool is available on the NCSC website. It's available for free and helps an organisation practice in…

Continue ReadingNCSC Excercise in a box launch
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

WordPress Security

  • Post author:jonathansblog
  • Post published:March 20, 2019
  • Post category:jonathansblog/Pentest/Wordpress
  • Post comments:0 Comments

This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…

Continue ReadingWordPress Security
Read more about the article Mod Security Web Application Firewall

Mod Security Web Application Firewall

  • Post author:jonathansblog
  • Post published:March 13, 2019
  • Post category:Apache
  • Post comments:0 Comments

What is a WAF A WAF is a web application firewall. A Web Application Firewall protects HTTP applications (eg websites) using a set of rules to protect against various common…

Continue ReadingMod Security Web Application Firewall
Read more about the article service-oriented architecture and frameworks – SOA frameworks

service-oriented architecture and frameworks – SOA frameworks

  • Post author:jonathansblog
  • Post published:September 22, 2018
  • Post category:Methodology

service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…

Continue Readingservice-oriented architecture and frameworks – SOA frameworks
Read more about the article Migrate music from itunes to google play

Migrate music from itunes to google play

  • Post author:jonathansblog
  • Post published:July 19, 2018
  • Post category:Android/Itunes
  • Post comments:0 Comments

Migrate music from itunes to google play. 1) goto play.google.com/music 2) sign up (the free service is fine, when it asks for a payment, you can select 'google play balance')…

Continue ReadingMigrate music from itunes to google play
Read more about the article The boathouse

The boathouse

  • Post author:jonathansblog
  • Post published:June 28, 2018
  • Post category:Amsterdam Blockchain
  • Post comments:0 Comments

With my ticket I had access to the networking after-event thing. it was a nice chilled way to end the first day. there were a lot of people and a…

Continue ReadingThe boathouse
Read more about the article Burpsuite beginners tutorial – how to use burp suite

Burpsuite beginners tutorial – how to use burp suite

  • Post author:jonathansblog
  • Post published:April 11, 2018
  • Post category:jonathansblog/Kali Linux/Pentest
  • Post comments:0 Comments

This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…

Continue ReadingBurpsuite beginners tutorial – how to use burp suite
Read more about the article Keyword research tools

Keyword research tools

  • Post author:jonathansblog
  • Post published:October 10, 2016
  • Post category:SEO
  • Post comments:0 Comments

Keyword research for organic SEO used to be easy. You didn't need any keyword research tools. Put up some content, let google index the content and watch in analytics as…

Continue ReadingKeyword research tools
  • 1
  • 2
  • 3
  • 4
  • …
  • 6
  • Go to the next page

Latest Posts

  • Securing an Agile World – NatWest
  • 2023 State of Operational Technology
  • DIGIT EXPO 2023
  • Kali purple cross-grade
  • Testing an API for hackers
  • subdomains brute force enum and finding tools
  • Vagrant for Beginners
  • Regular Software Updates: The Foundation of Mac Security
  • Understanding Gatekeeper: Controlling App Installations on macOS
  • User Account Management for Enhanced macOS Security
  • Data Encryption on macOS: Keeping Your Files Secure
  • Brewdog Rattle & Rum
  • Safe Browsing: Protecting Your Mac from Online Threats
  • Mead
  • Firewall Configuration and Management on macOS

Popular Posts

  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Linux commands for networking with command line
  • Wapiti tutorial
  • 4 types of service in an SOA system
  • OpenVas tutorial for beginners using web and metasploit
  • Nikto tutorial for kali linux
  • How to enable spotlight indexing on a network drive
Mastodon
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - OceanWP Theme by OceanWP