Blog Posts
- Home /
- Blog Posts
Investigation of insider attacks with computer forensics
October 7, 2018
Cyber-attacks do not always originate from outside of the target organisation.
Read More
Squid Proxy behind a Load Balancer on AWS
October 4, 2018
Squid is a proxy software that allows a computer without internet access to proxy through another computer that does have internet access.
Read More
How to install a Ruby Gem without Root on a Mac
October 1, 2018
Gems are little packaged Ruby applications that allow you to extend the ecosystem and reuse countless online sources.
Read More
The dark truth behind Advertising on the internet
October 1, 2018
The story Steve has a website which sells carpets in London.
Read More
International hosting governments and forensic email cases
September 30, 2018
Cyber forensics is hard, but it is even harder when servers are hosted in different geographical locations and an investigation needs all localities to cooperate and hand over every part of the data consistently.
Read More
When to give up on your startup/product
September 28, 2018
One of the hardest things you can do after trying to get a startup or product off the ground is to simply give up and call it a day.
Read More
Just SSH to my Jump Box!
September 26, 2018
I am a professional software engineer and do an absolute ton of devops work as well.
Read More
Counting in Python using a list
September 25, 2018
So before we begin, let me just tell you that this is a pretty useless thing to do.
Read More
Show the desktop’s image name on a Mac
September 23, 2018
Sometimes you just need to know where that image shown on your desktop is stored!
Read More
Network Forensics Concerns around GDPR
September 23, 2018
In Cyber Forensic there are a vast array of tools that are used throughout most investigations, however, not all jurisdictions allow or even agree to the usage of some of them.
Read More
A look into Future Developments in Operating Systems from a Cyber Forensics Investigator
September 16, 2018
Operating systems (OS) really have come a long way since the very first one was created by General Motors in 1956 (WIHT, 2017) to run on an IBM mainframe.
Read More
Comparing Interface Types in Cyber Forensics
September 2, 2018
In digital and cyber forensics, there are three main types of categories when it comes to forensic tooling.
Read More
Cyber Forensic Investigative Reports
August 26, 2018
Investigations are not proven in a jurisdiction until a detailed forensic report is created and presented to a judge or jury who can take it to the next level.
Read More
Altering Computer Evidence
August 19, 2018
Ever since it has been possible for humans to operate computers, some have used it to perform criminal activities.
Read More
Connection broken by ‘SSLError(SSLError(1, ‘[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:777)’
July 26, 2018
This happens when your machine does not have the correct certificate bundle to access the Pypi repository, or you are behind a corporate proxy that just loves to block everything!
Read More
Can’t pull a Git branch because of merge conflicts?
June 27, 2018
Sometimes you need to pull a remote branch and want to accept all their commits (and history) and override your own repository.
Read More
Software development processes
May 13, 2018
Introduction to Software Development Processes Gabry defines the Software Development Methodology to be a set of related activities that lead to the production of the software (2017).
Read More
Approaches to software reuse
May 13, 2018
Introduction to Software Reuse Software reuse is the process of creating software from antecedent and extant components.
Read More
Get the output of an application logged in the terminal
April 16, 2018
Just a quick note: You are probably looking for a Linux command called `dtrace`.
Read More
Agile as a Software Development Process
March 24, 2018
Waterfall and Agile are by far the most commonly used software development processes, however, within them, there are many different styles of software development used in the management of software development projects.
Read More
Tags
- Actionscript
- Advertising
- Agile
- AI
- Android
- Angular
- Ansible
- API
- Automation
- AWS
- Bash
- Big Data
- Biometrics
- C
- C++
- CDK
- Chef
- CICD
- CLI
- Cloud
- CloudFormation
- Containers
- CSS
- Data Structures
- Databases
- DevOps
- Distributed
- Docker
- Domains
- EKS
- Envoy
- Excel
- Firebase
- Forensics
- General
- Git
- Go
- Graal
- Hosting
- HTML
- IaC
- IDE
- Interview
- Istio
- Java
- Javascript
- Jenkins
- Kotlin
- Kubernetes
- Linux
- Mac
- MariaDB
- Maths
- Maven
- Microservices
- Misc
- ML
- MySQL
- Networking
- Nexus
- Node
- NPM
- Pandas
- PHP
- PIP
- Platform
- PowerShell
- Puppet
- Python
- React
- Ruby
- Rust
- S3
- Security
- SEO
- Software
- Spring
- SQL
- SRE
- SSH
- SSL
- Startup
- Terraform
- Typescript
- Ubuntu
- Web3
- Windows
- WSL