Pages

Categories

Python port scanner

2014 10.14 Python port scanner Category: Programming / Tag: network, port, python, scanner, security, university / Add Comment While in university I am learning about network security. I’ve finally being forced to learn the python language, at least to a competent level. So here’s a simple port scanner that...

Modes of Committing a Computer Crime

2014 10.14 Modes of Committing a Computer Crime Category: Computer Forensic Investigation / Tags: no tag / Add Comment In computer forensic investigation there are varying modes to committing a crime. New technology will create new crimes that we have never before imagined. The computer could be the object...

Computer Forensic Investigation – Phases of a Crime

2014 10.13 Computer Forensic Investigation – Phases of a Crime Category: Computer Forensic Investigation / Tags: no tag / Add Comment Network enumeration – Research the target. Vulnerability analysis – Detect how to attack the target. Exploitation – Compromise the system. A Standard Intrusion Scenario Reconnaissance – Network enumeration...

Fundamentals of Physics and Python

2014 07.22 Fundamentals of Physics and Python Category: Uncategorized / Tags: no tag / Add Comment There’s ~lots~ of programming resources out there. Many books (good and bad), and many websites (good and just don’t ever go there). In my experience of almost 10 years now, it’s finally time...

SSD Data Recovery Article

SSD Data Recovery Article Published on 13 April, 2014 This is an article I wrote about how SSD storage devices can be difficult for forensic analysis. How SSD Technology Has Made Digital Forensics Difficult Filed in Uncategorized | No replies...

Cryptography – One Time Pad

Cryptography – One Time Pad Published on 29 March, 2014 Currently in the process of making a simple application that can encrypt and decrypt data using the one time pad method. I’ve been working on it in my spare time and so far it can encrypt/decrypt a string, as...

Graph Theory

Graph Theory Published on 24 March, 2014 Graph theory is studying the connections/relation between entities to produce a model. A basic graph contains vertices/nodes and edges that show the relation between them. they can be used to visualise how a network (roads, cables, rooms/doors) is connected. Each graph contains...

Cryptography

Cryptography Published on 22 March, 2014 Cryptography is a technique used to securely communicate a message between two parties without a third party being able to decipher the true message. Definitions:  Alice & Bob – The parties that wishes to send/receive a message securely.  Eve – The...

C++ Obfuscated code

C++ Obfuscated code Published on 11 March, 2014 while on IRC, some one linked this piece of C++ code: Selec All Code: 1 int main()<%<:]{%>();%> It’s a perfectly valid piece of code too! It compiles, and as expected has no output. But how does it work? It was puzzling...

Queue

Queue Published on 10 March, 2014 The queue data structure is a first in, first out type that has two core operations, enqueue, and dequeue. The queue needs to keep track of two pieces of data, the head of the queue, and the tail of the queue. The head...