Latest Posts

Don’t Think Twice – Choose a Business Account


There are many people all over the world who’ve stuck with their ISP for years without even looking at the other options available. In the UK there have been lots of campaigns urging people to look at different providers and switching to the best value companies for their requirements. The problem is that people tend…

Read More

Behind Our Digital Identity


In the physical world, we’re overloaded with ways to identity ourselves.  We have identity cards, driving licenses, passports, health insurance cards and a myriad of other forms of identification methods. It’s tempting to look at an IP address and presume that they’re all more or less the same. The notation is standard across the board…

Read More

Testing Phases – Static Analysis


I once met a project manager who really didn’t enjoy the testing phase of a project. He was one of those time driven managers where milestones and targets were the most important factor in a project. His badge of honor was to deliver his projects on time and was immensely proud of this. Unfortunately by…

Read More

Are VPNs a Valid Privacy Tool ?


Is privacy a right, or in this world of terrorist threats is it something that we have to accept as a price to pay for keeping us safe. For many people the two are not mutually exclusive, and for many losing that privacy means that those who threaten us have won. The problem is that…

Read More

What Exactly is a Sneaker Proxy?


Online anonymity is important to many people for a variety of reasons. If you are unlucky enough to live in a country where the state controls and prosecutes people based on what they say online there’s obviously a priority. Many others are simply concerned about the abuse and control that the state and large corporations…

Read More

Common Lower Layer Protocols – ARP


One of the most useful protocols to understand especially when troubleshooting networks is that of the address resolution protocol. This is used to map internet addresses to hardware addresses at the lower layers of the OSI model. If you’re looking at figuring out issues in an unfamiliar network then having a good working knowledge of…

Read More

The Importance of the Software testing Cycle


If you’ve ever worked on a large IT project which has it’s own testing department, then you know it can be quite time consuming work. What’s worse you can sometimes be seen as a hindrance to the project rather than something that creates a quality product. Often you’ll see project managers who are more consumed…

Read More

The Security Dilemma – Passwords and Authentication


For those of us who’ve worked in IT for a few decades, the whole idea that we still use passwords as a means of authentication is quite remarkable. I remember many discussions in work and bulletin boards over twenty years ago about how insecure they were and the numerous better solutions. However they’re still very…

Read More

Coding a Football Computer Game


Coding sports games is not as simple as it sounds at least not to produce a really professional product. The easiest tasks involve management games like Football Manager which although complex are often just a matter of number crunching and analysing statistics. However games like FIFA 18 produced by Electronic Arts are arguably some of…

Read More

Computer Extortion – Common Techniques


Attacking large corporate websites, either through sabotage because the attacker is a disgruntled employee or disagrees with the company’s ethos, or to extort money from the company is becoming increasingly common. Large e-commerce sites are especially vulnerable since downtime on the website results in a huge toss of revenue and reputation. it extortion is involved. it is…

Read More

← OLDER POSTS