11 Articles in the category: Security
Stuxnet and the Birth of Cyber War
Fri, 23rd of August 2024 9:52 AMMost people are aware of the horrors of nuclear war. However there is much less awareness of the civilisation-ending potential of cyber war. Stuxnet is one of the most famous and sophisticated pieces of malware...
bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity
Mon, 10th of January 2022 11:20 PMThis page describes how to install bee-box, a virtual Linux installation containing bWAPP, which is a deliberately buggy web application to practice pentesting and other cyber security skills on. From the bWAPP website: ...
Introduction to the Iptables Firewall Program for Linux
Mon, 3rd of January 2022 8:51 PMThis page gives a quick introduction to the Iptables firewall software for Linux. More details will follow later... 1. How Iptables Works. The term “iptables” may refer to either the software firewall which is integrated...
Basics of SQL Injection Attacks
Mon, 3rd of January 2022 8:15 PMSQL injection attacks are carried out by inserting SQL code into a field where user input is accepted. If the user input is not correctly handled, this can result in the code executing by the...
Learn Encryption Concepts with the Historic Caesar Cipher
Thu, 30th of December 2021 11:32 PMThis is the first type of "secret spy code" I learned as a child, from a book called "The Spy's Guidebook". Years later, I learned that it's called a Caesar Cipher — named after Julius...
An Introduction to Port Scanning with Nmap
Thu, 23rd of December 2021 10:31 AMThis video gives an introduction and demonstration of port scanning, using Nmap and Masscan on Kali Linux. I made the video as part of an assignment for my Cyber Security course. I'll write more...
Log4Shell – The Single Biggest Security Vulnerability Ever?
Tue, 21st of December 2021 1:14 PMLog4Shell is a recently disclosed security vulnerability in a popular piece of software used for generating log files (including logging error messages), written in Java, known as Log4j. It's affected countless computers around the world...
Learn How to Hack Systems By Playing the Bandit Wargame
Wed, 8th of December 2021 11:21 PMYou can play this game to learn the basics of the Unix / Linux terminal "shell" command prompt, and many other essential skills used in computer networking, including hacking. I'll write much more about this soon...
My Coding and Developer Portfolio
Sun, 31st of October 2021 8:24 PMThis page began on 31 October, 2021 as a portfolio for my IT work, now that I'm back looking for IT work again. It was originally hosted on my Mathwiz maths tutoring website (before Byte...
Hardening Windows – How to Secure and Protect Windows
Thu, 7th of October 2021 12:35 AMThe main features are: Make a user account with only normal priveleges and not administrator ones, and use that account for your daily use. Only use the admin account when you are doing a lot of...
Nuclear Bomb Explosion Simulator
Mon, 7th of January 2019 4:14 PMThe nuclear bomb simulator shows the three main dangers from a nuclear war - fireball, blast, and fallout. Try it out by typing the name of...