Blog Posts

Investigation of insider attacks with computer forensics

October 7, 2018

Cyber-attacks do not always originate from outside of the target organisation.


Read More

Squid Proxy behind a Load Balancer on AWS

October 4, 2018

Squid is a proxy software that allows a computer without internet access to proxy through another computer that does have internet access.


Read More

How to install a Ruby Gem without Root on a Mac

October 1, 2018

Gems are little packaged Ruby applications that allow you to extend the ecosystem and reuse countless online sources.


Read More

The dark truth behind Advertising on the internet

October 1, 2018

The story Steve has a website which sells carpets in London.


Read More

International hosting governments and forensic email cases

September 30, 2018

Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities to cooperate and hand over every part of the data consistently.


Read More

When to give up on your startup/product

September 28, 2018

One of the hardest things you can do after trying to get a startup or product off the ground is to simply give up and call it a day.


Read More

Just SSH to my Jump Box!

September 26, 2018

I am a professional software engineer and do an absolute ton of devops work as well.


Read More

Counting in Python using a list

September 25, 2018

So before we begin, let me just tell you that this is a pretty useless thing to do.


Read More

Show the desktop’s image name on a Mac

September 23, 2018

Sometimes you just need to know where that image shown on your desktop is stored!


Read More

Network Forensics Concerns around GDPR

September 23, 2018

In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to the usage of some of them.


Read More

A look into Future Developments in Operating Systems from a Cyber Forensics Investigator

September 16, 2018

Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM mainframe.


Read More

Comparing Interface Types in Cyber Forensics

September 2, 2018

In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling.


Read More

Cyber Forensic Investigative Reports

August 26, 2018

Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the next level.


Read More

Altering Computer Evidence

August 19, 2018

Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities.


Read More

Connection broken by ‘SSLError(SSLError(1, ‘[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:777)’

July 26, 2018

This happens when your machine does not have the correct certificate bundle to access the Pypi repository, or you are behind a corporate proxy that just loves to block everything!


Read More

Can’t pull a Git branch because of merge conflicts?

June 27, 2018

Sometimes you need to pull a remote branch and want to accept all their commits (and history) and override your own repository.


Read More

Software development processes

May 13, 2018

Introduction to Software Development Processes Gabry defines the Software Development Methodology to be a set of related activities that lead to the production of the software (2017).


Read More

Approaches to software reuse

May 13, 2018

Introduction to Software Reuse Software reuse is the process of creating software from antecedent and extant components.


Read More

Get the output of an application logged in the terminal

April 16, 2018

Just a quick note: You are probably looking for a Linux command called `dtrace`.


Read More

Agile as a Software Development Process

March 24, 2018

Waterfall and Agile are by far the most commonly used software development processes, however, within them, there are many different styles of software development used in the management of software development projects.


Read More