cyber security Learning from cyber attacks Cyber attacks are a regular occurrence, and it's important that we learn from them.
cyber security Reusing paper - good for the environment, risky for privacy It's important to review the paper you re-use to avoid leaking confidential information.
cyber security Delegated trust vs Web of Trust The difference between the web of trust and delegating your trust to a third party.
cyber security Password cracking and how it can help your organisation Password cracking can be an invaluable tool when it comes to checking your organisation's password hygiene.
home automation Thoughts on home automation / smart homes - security (part2) Considering privacy and security with the IoT and smart homes.
home automation Thoughts on home automation / smart homes - part 1 Initial thoughts on home automation and smart homes.
public speaking CodeHarbour October 2019: Developing for Africa Slides from my CodeHarbour talk on the challenges of developing for Africa.
ethics A question of ethics: killing an AI - is it murder? As humankind gets increasingly closer to birthing a true AI, if an AI is killed is it murder?
cyber security What is a Next Generation firewall? A look at Next Generation firewalls and the extra services they often provide.
review WASD v3 mechanical keyboard review (part 2) Part two of my keyboard review, looking at its build quality and general usage.
review WASD v3 mechanical keyboard review (part 1) Part one of my WASD v3 keyboard review, starting with pre-sales and customisation.
cyber security Kent Cyber Security Forum 2019 A short write up following the Kent Cyber Security Forum 2019.
geek Why I write a blog There's been a few podcasts / Tweets / comments that I've noticed recently where people have talked about why they write a blog. This is why I blog (apparently it's a verb). I started blogging about 14 years ago, when it was becoming cool, and services
keyboards Choosing a mechanical keyboard I spent a couple of months researching mechanical keyboards before choosing which one to buy. Here's some of my research.
ethics A question of ethics: disclosing security vulnerabilities When you've found a vulnerability, bug or data leak how do you report it? This post looks at the considerations for disclosure.
Chromebook Installing Windows 98SE on a Chromebook (VM) Linux support on the Chromebook meant I could install Qemu. What better thing to do than install Windows 98SE?
eVitabu dev week Days 4 & 5: eVitabu dev week (July 2019) July 2019's dev week ended successfully with updates to both the Android app and the web management interface.
eVitabu dev week Days 1 - 3: eVitabu dev week (July 2019) The first few of days of July 2019's eVitabu development week.
Fix Problems with Systemd, Ghost and Node I encountered a problem starting my Ghost blog recently, following an update of Node. This post takes you through the fix.
ethics A question of ethics: filtering and censoring the Internet What's the difference between filtering and censorship? This is a fine line and something I discuss following years of managing web and email filters.
ethics A question of ethics: illegal discoveries during a penetration test Sometimes evidence of crime can be found during penetration tests, so what do you do? I'll discuss the various dilemmas professionals face following some Twitter research.