comp.org.uk
Networking articles
Physical Layer Architecture Recommendations
Backup as a Service (BaaS)
Overview of AWS neworking services
Networking Trends
Cloud Computing Deployment Models
Cloud Computing Service Models
How the SSH protocol works
Types of Computer Networks
Types of Network Topologies
An Introduction to OpenStack
The FCAPS Model of Network Management
An Overview of RFID
Basic Network Architecture
MAC Addresses
What is a Gateway?
The 7 layer OSI Model
How the Domain Name System works
Legacy Network Protocols
Virtual LANs (VLANs)
An Overview of LANs
VPN Basics
TCP/IP Layers Explained
What does a Proxy Server do?
Link Capacity and the Shannon-Hartley Theorem
Explanation of the Address Resolution Protocol
The Difference Between Bandwidth and Throughput
Message Segmentation in Networking
Network Planning Overview
Network Planning Questions
Understanding Software-Defined Networking
Application Layer
Considerations When Planning a Home Network
The difference between routed and routing protocols
VoIP Basics
Network Address Translation explained
Configuring your network using DHCP
Neighbor Discovery (ND) Protocol
Network Address Classes
Private IP addresses
ISDN: An Overview
Star-Bus Hybrid Topology
Why buy a UPS
Designing a Simple LAN - an example
Serial Line Internet Protocol (SLIP)
The User Datagram Protocol (UDP)
The Hierarchical IP Addressing Scheme
HTTP Header Codes
Security articles
The Dangers of Emission Security (EmSec)
Types of Ethical Hackers
Business Continuity Planning and Disaster Recovery Planning
An overview of Forensic Acquisition
Zero Day Exploits
How to Prevent the Theft of Electronic Devices
Attack Surfaces in respect to Hardware Security
Information Security Basics
Cloud Computing Security Risks
Models of Trust in Distributed Systems
Tips for Safer Browsing
Guide to encrypting files using pgp
Buffer Overflow Attack
Reconnaissance Attacks
Service Level Agreements
SSLScan: SSL/TLS scanning
Web Application Logic Hacking
Vulnerability assessment versus penetration testing
Security in Bluetooth Networks
Common Social Engineering Defenses
Cryptographic Key Management
Common Social Engineering Attacks
NFS Security
Code Injection Attack
Threat Modelling
Defend Against Port Scans
DNS Attacks
Access Attacks
Operating System Security
Wireless Intrusion Detection Systems (WIDS)
Network-Based Intrusion Detection Systems (NIDS)
Sniffing on Switches
What is a Hardware Trojan?
What is a Software Trojan?
Secure File Transfer
Hardware Security Timeline
Network Forensics Investigative Methodology (OSCAR)
Information Security Roles and Responsibilities
What is a Covert Channel?
Do we need Ethical Hackers?
Preventing Software Vulnerability Exploits on Linux
An Overview of Network Sniffers
The DMZ of the network
Cross-Site Request Forgery (CSRF)
Man in the middle attack
Smurf and Fraggle Attacks
Mobile Application Security
Types of Penetration Testing
Using a Layered Defense Strategy
The Lifecycle of a Cybersecurity Attack
Web Application Security
Factors of Authentication
What is a Bastion Host?
Securing Wireless LANs
Cross Site Scripting (XSS) Attacks
Understanding Security Policies
Ways to deliver Malicious Software
Types of Network Attacks
Computer Network Based Threats
Types of Cybersecurity Threats
Data Loss Prevention (DLP)
Securing the BIOS
Role of Firewalls
Circumvent BIOS Passwords
nmap: Port Scanner
OSSEC Host Intrusion Detection System (HIDS)
Security Architecture Models
SIEM (Security information and event management)
User Account Lifecycle
Pharming
Phishing
A primer on Multi-factor Authentication
Basic Cryptography Terms
Hydra: Online Password Hacking
SQL Injection
Online Security Resources
Logic Bombs
Challenge Handshake Authentication Protocol (CHAP)
Operating System Integrity
What is an Access Control List?
netenum: Ping Sweep
What was Smurfing all about?
The TCP Flaw
Electronic Payment Security
Risk Management Basics
Types of Viruses
The Internet Worm
Programming articles
Follow the Python PEP 8 Style Guide
Keeping up to date with Wordpress
Assembly language on the Raspberry Pi
Benefits of programming in Python
An introduction to model based development
Extreme Programming (XP)
Types of Programming Languages
What is Version Control?
The purpose of subroutines – saving space and effort
An introduction to Perl
Linux Kernel System Calls
Static and Shared Libraries
How to program in C on Linux
The Software Development Tools in Linux
Advantages and Disadvantages of Web Applications
Linux articles
Manage your schedule from the command line with calcurse
Post to pastebin from the command line
How Linux kernel numbering works
An Intro to init
Linux Scripting Languages
OCR in Ubuntu using tesseract and gimagereader
Linux Backup Solutions
Where are Raspberry Pi log files kept?
Raspberry Pi File Structure
Which shell am I using?
Manage PDFs from the command line
Raspberry Pi Virus Protection
Pelican - a fast blog for the Raspberry Pi
Getting your Raspberry Pi to speak the weather forecast
What is the Linux Kernel?
How to convert images from the command line
Understanding the FSF Philosophy
Generate a Random Password in Linux
Setup an Internal NTP Server
Licensing Linux
An introduction to sudo
The Linux graphical user interface
Linux Editor Comparison
alias: Create Your Own Commands
Finding files on Linux
How Does a Linux Firewall Work?
Interprocess Communication and Synchronization
Linux Account Maintenance
Linux Audio Conversion Tools
ln: Create Symbolic or Hard Links
Using and Blocking Traceroute
Real Time Messaging with Wall and Write
Why Linux is the right operating system for you
Why Partition Drives in Linux?
shred: Securely delete files using shred
GNU software found on most Linux distributions
Adding line numbers to a file using nl
Examining processes using top
How to use gzip
Mount Drives in Linux
Using the ping command
Send Mail from the Command Line
Display Future Date and Time in Linux
Find CPU Details in Linux
Text Processing in Linux
Displaying files in Octal
sc: Command Line Spreadsheet
Sorting using the sort command
Save the output of a command as an image
Access Command History
How the Linux Boot Process Works
Monitor System Logs with fail2ban
Computer Science articles
Exploring Smart Cities
Offline Backups
Uses of computers in Education
Data Processing to gain information
Data Compression
Characteristics of Distributed Systems
RAID - Redundant Array of Independent Disks
Types of Programming Languages
Computer input devices
What is a protocol?
History of Computing
Object Based Storage Concepts
Backing up your data
Image representation in Computer Systems
Ascii Table
The Benefits of Magnetic Tape for Backups
Latest Blog Posts
Simple Mistakes We All Make With Regards To Kitchen & Dining Aids
The Eight Greatest Childcare Centre Management Apps Errors You Can Easily Avoid
Six Things That Industry Professionals Don't Want You To Realise About Up And Over Garage Doors
A Range Of Opinions About LPG Boilers That You May Not Have Examined
An Insiders Story On Online Branding Agencies
The Five Utmost Wooden Pergolas Errors You Can Easily Avoid
Five Mind Numbing Facts About QMS Audit Management Software Packages
Simple Gaffes We All Make With Regards To Wild Bird Treats
A Number Of Opinions On Organic Pellets That You May Not Have Considered
How Popular Are Superstar Videos Just Now?
Unambiguous Guidelines On Hand Picking Your Next Mental Health Software Packages
How Mainstream Are Public Relations Organisations Nowadays?
Eight Justifications Why You Shouldn't Dismiss Projection Mapping Systems
Simple Mistakes We All Make Regarding Steel Storage Buildings
Discussions Around Edwardian Sash Windows
Seven Things That Industry Professionals Don't Want You To Learn About Cataract Operations
How Dominant Are Storytelling Using Data Companies Just Now?
Six Reasons Why You Shouldn't Ignore Natural Playground Equipment Suppliers
What People Ought To Know About Telecommunications Circuits
The Ten Utmost Loft Conversions Mistakes You Can Easily Avoid
Nine Thoughts On Why You Shouldn't Ignore SEO Experts
What People Need To Understand About SEO Partners