Skip to content
JONATHANS BLOG
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Kali Linux
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mail.app
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Music
    • Ableton
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
Menu Close
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Kali Linux
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mail.app
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Music
    • Ableton
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio

Secure

Home > Secure
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

OS Detection Techniques

  • Post author:Jonathan Mitchell
  • Post published:July 14, 2019
  • Post category:jonathansblog/Methodology/Pentest
  • Post comments:0 Comments

Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…

Continue ReadingOS Detection Techniques
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226
image courtesy of https://www.flickr.com/photos/christiaancolen/20607701226

WordPress Security

  • Post author:Jonathan Mitchell
  • Post published:March 20, 2019
  • Post category:jonathansblog/Pentest/Wordpress
  • Post comments:0 Comments

This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…

Continue ReadingWordPress Security
Read more about the article Raspberry Pi hacking

Raspberry Pi hacking

  • Post author:Jonathan Mitchell
  • Post published:February 27, 2019
  • Post category:Hardware hacking/Kali Linux/raspberry pi
  • Post comments:0 Comments

This tutorial will show you how to make a Raspberry Pi hack tool by installing Kali on the Raspberry Pi - by the end of this guide you will have…

Continue ReadingRaspberry Pi hacking
Read more about the article How to use metasploit to scan for vulnerabilities

How to use metasploit to scan for vulnerabilities

  • Post author:Jonathan Mitchell
  • Post published:August 28, 2018
  • Post category:Commandline/jonathansblog/Kali Linux/Linux/Metasploit/Networking/Pentest
  • Post comments:1 Comment

Continuing on from my original metasploit beginners tutorial, here is a slightly more advanced Metasploit tutorial on how to use metasploit to scan for vulnerabilities. The outcome of this tutorial…

Continue ReadingHow to use metasploit to scan for vulnerabilities
Read more about the article Keynote panel: An E2E approach to tackling data security challenges of the IoT

Keynote panel: An E2E approach to tackling data security challenges of the IoT

  • Post author:Jonathan Mitchell
  • Post published:June 28, 2018
  • Post category:Amsterdam Blockchain
  • Post comments:0 Comments

keynote panel: An E2E approach to tackling data security challenges of the IoT Right now we have lots of theory about security, so intellectually we are good. in practice we…

Continue ReadingKeynote panel: An E2E approach to tackling data security challenges of the IoT
Read more about the article Privacy settings

Privacy settings

  • Post author:Jonathan Mitchell
  • Post published:April 28, 2018
  • Post category:Iphone and ipad/Osx/Safari
  • Post comments:0 Comments

This post is a combination of previous posts about privacy settings in mac and ios. Safari do not track: Safari gives users the option to enable the 'do not track'…

Continue ReadingPrivacy settings
Read more about the article Burpsuite beginners tutorial – how to use burp suite

Burpsuite beginners tutorial – how to use burp suite

  • Post author:Jonathan Mitchell
  • Post published:April 11, 2018
  • Post category:jonathansblog/Kali Linux/Pentest
  • Post comments:0 Comments

This is a burp suite beginners tutorial. Burpsuite is a collection of tools, written in Java used to perform various network security related tasks. Burpsuite can be used as a…

Continue ReadingBurpsuite beginners tutorial – how to use burp suite
Read more about the article Blackarch pacman package groups for tools

Blackarch pacman package groups for tools

  • Post author:Jonathan Mitchell
  • Post published:September 3, 2017
  • Post category:Kali Linux
  • Post comments:0 Comments

Blackarch pacman package groups Install with pacman -S groupname to quickly install a bunch of tools in one command: This info is available in the blackarch developers guide here: https://blackarch.org/blackarch-guide-en.pdf…

Continue ReadingBlackarch pacman package groups for tools
Read more about the article Configuring free SSL certs with Letsencrypt in centos

Configuring free SSL certs with Letsencrypt in centos

  • Post author:Jonathan Mitchell
  • Post published:June 11, 2016
  • Post category:Apache/Internet/Networking/Wordpress
  • Post comments:0 Comments

Configuring free ssl certs with letsencrypt in centos Using letsencrypt in centos requires a few modifications to your centos before you can run the letsencrypt client. The setup for vhosts…

Continue ReadingConfiguring free SSL certs with Letsencrypt in centos
Read more about the article Portfolio – Jonathan Mitchell MSc BSc MBCS

Portfolio – Jonathan Mitchell MSc BSc MBCS

  • Post author:Jonathan Mitchell
  • Post published:June 8, 2014
  • Post category:Development/Php
  • Post comments:0 Comments

Jonathan Mitchell Portfolio About Me I have a BSc in Electronic Engineering, and an MSc in Advanced Computer Systems Development with Distinction. I was awarded the University Court Medal for…

Continue ReadingPortfolio – Jonathan Mitchell MSc BSc MBCS
Read more about the article Best practice for mac security

Best practice for mac security

  • Post author:Jonathan Mitchell
  • Post published:August 25, 2013
  • Post category:Security
  • Post comments:0 Comments

This post is a collection of things to form a best practice for mac security. 1) enable password after sleep or screensaver. settings > security > require a password immediately…

Continue ReadingBest practice for mac security
Read more about the article Use siri to generate secure passwords

Use siri to generate secure passwords

  • Post author:Jonathan Mitchell
  • Post published:June 19, 2013
  • Post category:Iphone and ipad/Security
  • Post comments:0 Comments

Finally a use for siri! you can use siri to generate secure passwords. thanks to the wolfram alpha integration inside siri you can ask: wolfram alpha password and siri will…

Continue ReadingUse siri to generate secure passwords
Read more about the article The nifty minidrive secure digital SD card sits flush with mac case

The nifty minidrive secure digital SD card sits flush with mac case

  • Post author:Jonathan Mitchell
  • Post published:July 11, 2012
  • Post category:Mac stuff
  • Post comments:0 Comments

this is just what ive been looking for. its an adaptor for a micro sd card that sits flush with the edge of your macbook air or macbook pro case.…

Continue ReadingThe nifty minidrive secure digital SD card sits flush with mac case
Read more about the article Enable secure https twitter browsing

Enable secure https twitter browsing

  • Post author:Jonathan Mitchell
  • Post published:March 23, 2011
  • Post category:Social networking
  • Post comments:0 Comments

How to enable secure https twitter browsing 1) goto twitter 2) goto settings > account 3) at the very bottom you will find a checkbox for HTTPS Only 4) tick…

Continue ReadingEnable secure https twitter browsing
Read more about the article Enable secure https facebook browsing

Enable secure https facebook browsing

  • Post author:Jonathan Mitchell
  • Post published:February 15, 2011
  • Post category:Social networking
  • Post comments:2 Comments

How to enable secure https facebook browsing 1) goto facebook 2) goto account > account settings 3) under account security hit 'change' 4) tick the box labeled 'Secure browsing (https)'…

Continue ReadingEnable secure https facebook browsing
Read more about the article Install backtrack repo in ubuntu

Install backtrack repo in ubuntu

  • Post author:Jonathan Mitchell
  • Post published:May 29, 2010
  • Post category:Kali Linux
  • Post comments:6 Comments

This post will show you how to Install backtrack repo in ubuntu - I got an HP mini netbook a couple of days ago. I'm mostly going to use it…

Continue ReadingInstall backtrack repo in ubuntu
Read more about the article Mcaffee and PCI complience

Mcaffee and PCI complience

  • Post author:Jonathan Mitchell
  • Post published:August 11, 2009
  • Post category:Development
  • Post comments:0 Comments

One of the sites that I made for work now has mcaffeeand pci complience. the site is www.e-security-exchange.com some of the features of the site are : CMS, e-commerce platform,…

Continue ReadingMcaffee and PCI complience

Latest Posts

  • Odins Beard
  • Ooni Pizza Oven!
  • Beavertown Neck Oil
  • York – 2021
  • Cider batch 5
  • Amazfit Bip U Pro
  • Ardbeg Uigedail
  • Golden Stag Ale bottling!
  • Adding hops to the Golden Stag
  • nc netcat opening listening ports
  • Homebrew IPA Beer battered haddock and chips
  • zmap on a local network
  • Festival Golden Stag Homebrew
  • Suntory Whisky Toki
  • Jameson Stout Edition and Guiness

Popular Posts

  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Linux commands for networking with command line
  • Wapiti tutorial
  • 4 types of service in an SOA system
  • OpenVas tutorial for beginners using web and metasploit
  • Nikto tutorial for kali linux
  • How to enable spotlight indexing on a network drive
  • Privacy Policy
  • Jonathan Mitchell BSc MSc MBCS – CTO at Cyber Security Startup ShadowDetect
Copyright - OceanWP Theme by OceanWP