OS Detection Techniques
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
Os Detection Techniques and OS fingerprinting Os Detection Techniques - Background information This is a list of Os Detection Techniques, with explanations for all the active and passive Os Detection…
I have decided to start studying towards a CISSP and / or an OSCP, as part of that I saw an excellent blog post recommending to go through a lot…
This is a WordPress Security mega-post containing a lot of best-practice information on securing, hardening, updating and maintaining a Wordpress site.Used by more than 60 million websites, including 30% of…
Malware detection on Plesk systems using maldet and clamav Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the…
I finally swapped my iPhone for an android phone. I've been an iPhone user since the iPhone 3gs, right through till the 6plus. I was spoiled a little in the…
Remote Debugging PHP in SublimeText with XDebug prereqs: This post assumes you already have a working xdebug install SublimeText How to get Xdebug working with Sublime Text? Open SublimeText Open…
service-oriented architecture and frameworks IntroductionPapazoglou, (2003) organised SOA in four architectural layers: Service Foundations, Service Composition, Service Management and Service Engineering and outlined a host of technologies that could be…
build your own blockchain application in less than an hour Edward Ciggaar developer advocate IBM I've been looking forward to this one for a while now :D starting with an…
This is a very interesting panel on cyber security and id management / user verification using blockchain technologies its a lot of high level topics, and a few of the…
There are a couple of things you need for mining monero in osx using xmring: 1) A monero wallet (get one from mymonero.com) 2) Homebrew (brew.sh) mining monero in osx…
Blackarch pacman package groups Install with pacman -S groupname to quickly install a bunch of tools in one command: This info is available in the blackarch developers guide here: https://blackarch.org/blackarch-guide-en.pdf…
Automatic updates in kali (and other apt based distros). There are a ton of ways to do automatic updates in kali linux (though this will work on debian, ubuntu, proxmox…
This post has a collection of Linux commands for networking. There are basic linux network commands, advanced linux network commands and some centos network configuration commands, but I've tried to…
Altcoins exploded in 2015. Minergate is a nice little site that offers various GUI clients for cpu and gpu mining. This is a short little post about mining altcoins in…
How to install birdwatcher in kali linux Birdwatcher is an OSINT data analysis and data gathering tool for twitter. Birdwatcher has been designed to feel like metasploit or recon-ng, so…
Configuring free ssl certs with letsencrypt in centos Using letsencrypt in centos requires a few modifications to your centos before you can run the letsencrypt client. The setup for vhosts…
This is a quick post about importing nessus6 scan results into metasploit. This can be very useful for adding a ton of information into a new Metsploit database, or adding…
Multiple ip addresses on one physical NIC. I have a gigabyte brix running esxi to host a few virtualised servers. I have one server for my web development. I have…
What is an sql injection attack? All websites process data entered by users. An input-validation attack is when unexpected user input is processed by a web server or database and…
This is a short tutorial showing how to setup wordpress and cloudflare flexible ssl. Cloudflare offer a service called 'flexible ssl' this means that cloudflare encrypts your content between the…
This is a sponsored post. I dont usually do sponsored posts, but this one is different (I’m getting a hat for drawing attention to this, and I think its worthwhile).…
This is a basic openvas tutorial for beginners. I will explain a little of how to use openvas web ui to perform a test of your systems. It will give…
This post will show you how to install phpcs and phpmd in sublime text on your mac: Following on from my post about using git and phpcs in brackets, I…
This post will show you how to mount a remote ssh filesystem as a 'drive' in osx using a bash script, osxfuse and brew. There are a few ways to…
Jonathan Mitchell Portfolio About Me I have a BSc in Electronic Engineering, and an MSc in Advanced Computer Systems Development with Distinction. I was awarded the University Court Medal for…
Oracle process overview. There are 3 types of oracle processes: USER processes SERVER processes BACKGROUND processes User connected to a user application (eg sql*plus) controls the application associated with an…
Oracle logical structures Oracle logical structures can be summarised by the following: Schema. Tablespace. Datablock. Redo log. Schema collection of objects (table, view, etc) owned by db user name is…
This is the change log for multiloquent 6 1 01 11a7be0 psr2 fixes abe3129 psr2 changes 80cbc30 misc tidy ups 00d17a1 tag link 5ea34c5 pagination dd3582f pagination still 9443ffa pagination…
How to change the number of icons in launchpad - this is a great tip: change the number of icons in launchpad! if you use launchpad a lot (I don't,…
This post is a collection of things to form a best practice for mac security. 1) enable password after sleep or screensaver. settings > security > require a password immediately…
This is an easy way to change the username of your wordpress admin account: login as your current admin user navigate to users > all users add a new user…
Enable camera on iphone or ipad lockscreen instructions for ios11 instructions for ios10 instructions for ios7 instructions for ios5.1 and ios6 instructions for pre ios5 How to enable camera on…
Enable firmware password on osx: This post will show you how to enable the firmware password on osx firmware passwords will protect your mac from: booting from a cd or…
This will show you how to use ssh with keys for authentication. this has a couple of advantages over using passwords: 1) you can enable key only logins. 2) you…
I get a lot of spam bots visiting my site and trying to post comments. akismet stops them being in my approve queue (i have to approve all of the…
Here are some tips to make your mac boot faster: Rotate your logs open terminal > type: sudo periodic daily weekly monthly this command runs the log rotate scripts, etc…
There are lots of firefox addons for web development; here are the best firefox addons for web development I use on a daily basis. firebug Firebug integrates with Firefox to…
This is a short nessus tutorial to help you get to grips with nessus. Nessus is a vulnerability scanner. Nessus can scan your assets for network security vulnerabilities. Nessus allows…