Any sufficiently advanced technology is indistinguishable from magic. – A. C. Clarke

  • Reviving an Old Laptop

    I recently found an old laptop with its charging cable in my house. Out of curiosity, I plugged it into mains and left it for a couple of hours. I came back to it and I pressed and held the power button for a few seconds. I was pleasantly surprised to find that the computer…

  • Passwords

    How many accoounts do you have? I might as well be asking how many slices of bread you have eaten in your life. Any service you use on the internet seems to now require an account to access its features sometimes paying for further advanced features. You select “Sign-up”. You input your email address and…

  • Cyber Kill Chain

    “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War It seems that every other week, a major data breach has occurred. Exposing personal information of often thousands of customers. And that’s of the breaches that we are made aware…

  • OSI Model

    Computers are complicated. Networks of computers are even more complicated. Computers and applications communicate with one another using various protocols and software. That last sentence is very vague and really doesn’t give any real insight on how computers communicate with each other, whatever that means. Is there a way to break down and categorise this…

  • Pyramid of Pain

    There have been many legendary pyramids throughout human history. Chichen Itza. The Great Pyramids of Giza. The Food Pyramid. Each of which is a feat of human engineering. But none are as disappointingly mediocre as the Pyramid of Pain. The Pyramid of Pain is a cybersecurity framework that is mainly used in incident response. Incidents…

  • Encryption

    Whenever you send a message, there is always the concern of whether a malicious third party will intercept it and run with the precious information contained within the message. If we were talking about physical messages like handwritten letters, there isn’t much that can be done about it if the envelope is retreived by someone…