Category Archives: IT

Spear Phishing is not a game

What is phishing? Phishing is one of the easiest forms of cyber attack for a criminal to carry out, but one which can provide these crooks with everything they need to infiltrate every aspect of their targets' personal and working lives. Usually carried out over email - although the scam has now spread to social…
Read more

Playing battleships over BGP

Author of this blog post is BenJOJO:¬†https://blog.benjojo.co.uk/post/bgp-battleships¬† BGP is the glue of the internet. For a protocol that was produced on two napkins in 1989 it is both amazing and horrifying that it runs almost all of the ISP to ISP interactions and is now a very fundemental part of the internet. BGP normally gets…
Read more

The importance to be a “busybox”

Busybox is a swiss army knife utility that is very useful for system recovery. Recently I had a server with a SCSI backplane issue that caused SCSI drives to "fail" and remove themselves from the kernel. The drives were tested in other server and work fine, and this was happening with multiple different drives. Before…
Read more

Bridging vs Routing Firewalls

A bridging firewall (sometimes called a transparent firewall) is a security appliance that does NOT actively participate in the routing of packets that are allowed by the policies in place to pass through the device. Typically firewalls are actively participating in the routing configuration for the networks that they protect. Firewalls that protect a single…
Read more