Posts

Showing posts from August, 2023

Published: Software Defined Radio & Radio Hacking. Part 1

I published Software Defined Radio & Radio Hacking. Part 1 on Medium .

Published: The Hazards of Demining: Understanding the Challenges in Ukraine

I published The Hazards of Demining: Understanding the Challenges in Ukraine on Medium .

Published: Tweets of Deceit: Unmasking An Attempted Crypto Con

I published Tweets of Deceit: Unmasking An Attempted Crypto Con on Medium .

Computing In Isolation: Looking at North Korea's Red Star Linux

Image
The tale of Red Star is one of tracking, control and containment. It’s hard to be a user of technology and have to pick a side of the fence to sit on. Apple over Android. Windows over Linux. Freeware over Payware. However, one operating system quietly stands out not only for its unique features but also for the intriguing geopolitical context in which it was developed. Enter Red Star Linux, an operating system born in the heart of North Korea, designed to provide its citizens with a distinct digital experience. While most operating systems are products of international collaboration and technological evolution, Red Star Linux offers a glimpse into the controlled and isolated digital environment of North Korea. Developed under the guidance of the country’s government, this operating system presents a blend of functionality, ideology, and technological autonomy that sets it apart from its mainstream counterparts. In this article, we embark on a journey to uncover the intrigui...

What The Tech?! Decentralized & Cloud Computing

Image
Decentralized computing services unlocked a whole new part of the Tech sector. If you’re of the younger generation that grew up with iCloud, Dropbox and other cloud based services then like many, you’ve already had plenty of exposure to cloud resources. However it might surprise you to know that in the early days of computing and the internet, that there was also another form of decentralized computing. It was called TimeShare, and it allowed companies to access resources without having the financial penalty incurred by procuring large systems to operate in house. In today’s article, we’ll be looking back at some of those timeshare days to see how they laid down the foundations for today’s cloud based services. What the Tech is going peak 1960’s. Lets do it! The Beginning To look at the beginnings of TimeShare, we need to go back many decades to the 1960’s. With the excitement of the space race, the establishment of nuclear energy and the proliferation of television, telephones...

Crypto Intelligence: Using Arkham For Wallet Tracking

Image
New Wallet tracking tools are added all the time. Arkham is a fresh twist, with plenty of potential and a possible second airdrop. There’s a perception by many that the blockchain is privacy focused however it’s not until you start exploring the space that you realize this is simply untrue. While there’s plenty of privacy focused coins that are able to provide privacy functions, many blockchains simply require the right tools to explore the blockchain easily. In today’s article, we’ll be exploring one of these tools and looking at various features, within the package including bounty hunting, transaction flagging and more. Arkham Intelligence, Lets get to it!    If you’re an airdrop hunter the name Arkham might already be familiar to you. In 2023, Arkham provided an airdrop for users of the platform. While the initial airdrop was lucrative, the rumor mill says that that we may see more of this as the year unfolds. So putting the benefits of the platform aside, there is qu...

WebScraping & OSINT: A Beginners Guide

Image
If you’re new to OSINT or Cybersecurity, it may surprise you at how often web scraping is used.  In today’s piece on OSINT tools, we’ll be exploring web scraping. Web scraping is a powerful tool for collecting and analyzing data from websites. It can be used for various purposes, such as data analysis, research, and automation. We’ll look at the reasons behind web scraping and how it can be used effectively for open source intelligence (OSINT) gathering. What is Web Scraping? Web scraping is the process of collecting and parsing data from websites. It involves sending a request to a website’s server, retrieving the HTML content of the web page, and extracting the desired data from the HTML structure. Web scraping can be done manually, but it is often automated using specialized tools and programming languages such as Python. There’s also automatic web scrapers that map the internet for us, quietly exploring and searching through new machines, pages and systems.  How Does Web Scra...

Crypto Newbies: Things to Consider when using Crypto

Image
Navigating the world of crypto can be daunting for newcomers. Please note that experimenting with cryptocurrency can be risky, with prices fluctuating and plenty of scams in the field. No advice in this article should be taken as financial advice and any readers should do their own research before parting with funds or making any investment into crypto. We also recommend that should you wish to play, you maintain your funds in a hardware wallet. Not your Keys, not your Crypto, use exchanges at your peril . If you’ve followed for a while you’re probably aware that we tend to like our crypto. Given the spike in popularity during covid it’s fair to say that plenty of others like their crypto too. But if you’re new to the world of cryptocurrencies figuring out what’s safe, how to store and where to get your crypto from can be an overwhelming experience. There’s foreign jargon, and plenty of bright lights encouraging you to “transact here!”. Today we’ll break some of this down and take...

Web Navigation: The Epic First Browser War.

Image
The battle between Netscape and Internet Explorer was an epic tale. The 1990’s. It was a time of dial up internet, floppy discs and the now iconic “you’ve got mail” from AOL. While we’ve navigated the dot com bubble before in our previous What the Tech pieces, today we’ll be looking at the digital battle royale that came to be known as the browser wars. This battle to dominate the early web led to innovation, rapid development and massive massive amounts of rivalry. It also would ultimately help shape our digital landscape we use today. Red vs Blue, let’s get to it! The Beginnings In the early days of the internet, despite showing promise there was much to be developed to obtain the productivity benefits we see in the digital world today. Picture this. We boot our machine, use our dial up modem to connect to our ISP via telephone line and then. Wait. At this point in the internet, we barely have a way to navigate our new world. Like the development of search, it took time for th...

Wireshark Unleashed: Harnessing The Power of Packet Analysis

Image
Wireshark is an essential tool for those in the info & cyber security field. If you’re looking to analyse network traffic or conduct electronic counter surveillance then you’ll need to build a box of electronic tools that you can turn to and use to achieve these goals. Today, we’ll be looking at one of the tools we can use for network and packet analysis. It’s not the only tool for this job, but it is one of our favorites. It’s time to check out WireShark! Note: While Wireshark is an open source tool available for anyone to download, it’s important to understand that in many places how we use this tool will define it’s legality. Whilst it’s usually perfectly legal to intercept and assess traffic and data within your own network, using it to intercept traffic that doesn’t belong to you, or using information from third party traffic you aren’t legally allowed to intercept turns this in to a Black Hat scenario. Don’t be “that guy”. There’s plenty of PCAPS available to experiment...

ad social bar