Due to a lack of spare parts, I fabricated a missing power adapter cable for the Loctek HCB107A-1 height adjustable desk controller.
August 28, 2023
The scheduled task will flow like this. The action will trigger at specific times and run a VBScript invoking a background shell to launch our PowerShell script. This PowerShell script plays our audio file. The example here will use the stock market bells on the opening and closing times of the market.
September 14, 2022
In this post, I will describe a couple of real-life examples of where the predictability of visible information can lead to problems such as information disclosure and unintended authentication bypass.
September 6, 2022
These are some of my digital forensics/steganography capture-the-flag challenges available for download. The ideas are a combination of adaptations of known methods and inspiration from film and TV.
September 5, 2021
August 8, 2021
Here is a list of rogue network autonomous system numbers and a Cloudflare firewall configuration to help get you started with protecting your website.
August 5, 2021
A brief how-to guide outlining the installation of bXSS (https://github.com/LewisArdern/bXSS) inside a Docker container....
August 4, 2021
Scam baiting for experience building. A walk-through of a basic OSINT research process for finding Cloudflare-protected hosting, domain, and scammer information.
Whilst on the phone I decided to practise some people skills. I learned about a service called Grabify from watching Jim Browning videos on YouTube. Grabify is a URL shortener that logs IP addresses.
June 16, 2021
This guide is intended to walk you through setting up and configuring a working VPN using Amazon’s AWS free tiers, the EC2 t2.micro instance. The guide is written for beginners who are using the Windows operating system.
December 14, 2016
Kraken issued a warning on its blog regarding various phishing attacks that have caused some accounts to lose their Bitcoin. I decided to do some research into how this could have happened.
August 19, 2016
A basic getting started guide for using GnuPG and the Windows command prompt CLI. Contains important information regarding insecure cipher and digest preferences.
November 11, 2015