I build websites for small businesses…

My names Paul Joyce. I build beautiful and functional websites for small businesses, start ups and charities.

I’ve built websites for charities and small businesses in the Swindon (Wiltshire) area, as well as a series of projects for design agencies in London and Scotland.

Using several years experience I’ll work closely with you to convert your business problem into a viable and usable web solution that you can afford.

Browse some of my handywork…

One Voice Prayer Website

One Voice Prayer Website

One Voice One Voice is a network of Christian organizations, prayer networks, churches, and individuals who believe that prayer is the most powerful intervention. I was brought on board this project by the digi…
Aids Consortium

Aids Consortium Website

UK Aids Consortium The UK Aids Consortium is a network of over 80 not-for-profit, faith-based and academic agencies. Based in the UK, with strong links to governments, international and multilateral agencies, t…
Water Springs - Business Cards

Water Springs Business Cards

The design brief was to produce a selection of smart yet elegant business cards for a water treatment company. First problem, how do you make water treatment elegant? I finally settled on these four cards to p…
View Portfolio »

Read a few of my thoughts…

What is a UDP Flood Attack (DoS)

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis that UDP connections are stateless. We recently discussed about TCP SYN attacks being used to DoS targ…

How to do Port Scanning with Nmap

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system admin…

Vulnerability Scanners Vs Penetration Tester

While browsing forums and articles it seems there’s some confusion over the distinction between vulnerability scanners and penetration testers. What do these two digital security roles have in common, whe…

How to remember the OSI 7 model in order

Remembering the OSI 7 Model – Mnemonics The order that the different layers of the Open Systems Interconnection 7 model are found in matters hugely; needless to say you in certain IT roles you cant afford…

What is a TCP SYN Flood Attack (DoS)

Today we’re looking at a specific type of DoS attack; the SYN flood denial of service attack. Although this type of attack can just as equally be performed as a DDoS attack, the examples we’ll use a…

Explaining Denial of Service Attacks

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of …
Read Blog »

Links and useful footery things…

Copyright © 2016 Paul Joyce. Follow me on Twitter or perhaps Google+