A run down of the podcasts I listen to the most.
A short write up following the Kent Cyber Security Forum 2019.
There's been a few podcasts / Tweets / comments that I've noticed recently where people have talked about why they write a blog. This is why I blog (apparently it's a verb). I started blogging
I spent a couple of months researching mechanical keyboards before choosing which one to buy. Here's some of my research.
When you've found a vulnerability, bug or data leak how do you report it? This post looks at the considerations for disclosure.
Linux support on the Chromebook meant I could install Qemu. What better thing to do than install Windows 98SE?
July 2019's dev week ended successfully with updates to both the Android app and the web management interface.
The first few of days of July 2019's eVitabu development week.
A visit to Bigbury Fort, Harbledown.
I encountered a problem starting my Ghost blog recently, following an update of Node. This post takes you through the fix.
What's the difference between filtering and censorship? This is a fine line and something I discuss following years of managing web and email filters.
Sometimes evidence of crime can be found during penetration tests, so what do you do? I'll discuss the various dilemmas professionals face following some Twitter research.
Importing updates to WSUS from the Windows Update Catalogue requires TLS v1.0 client and SHA.
Thoughts on being fair and considerate when investigating others.
A discussion about the ethics of deleting emails from someone else's mailbox.
Reviewing the Asus Chromebook C423NA from a practical point of view.
Logging: what's too much? Is there too little? How long should I keep them? This post discusses factors to consider when configuring logging.
A quick look at what a basic firewall is, and how it works.
Testing your business continuity plan is a worthwhile exercise. When did you last test yours?
Some unanswered questions from Andromeda.
Advice on public speaking, based on my experiences so far.
Discussing some of the ways to prevent insecure direct object reference issues.
I had unfinished business with Harbledown Junction and conclude my research in this post. Probably!
An explanation of why I don't feel Google's GSuite is ready for the enterprise yet.
When faced with an application that wouldn't connect to the Interet because the proxy was in the way, I used Procmon and Wireshark to prove that was really the problem.