IT professional, photographer and film lover

Programmer, IT professional, sys + DB admin, hacker, etc

Lover of films and most genres. Same could be said for music; although a bias towards FFDP, Metallica and Disturbed

Can't beat some serious guitar work of modern day blues legends; Joe Bonamassa, Walter Trout, Aynsley Lister etc

My random musings over the years…

What is a UDP Flood Attack (DoS)

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis that UDP connections are stateless. We recently discussed about TCP SYN attacks being used to DoS targ…

How to do Port Scanning with Nmap

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you the power to explore a network and scan ports of various targets you find. Network and system admin…

Vulnerability Scanners Vs Penetration Tester

While browsing forums and articles it seems there’s some confusion over the distinction between vulnerability scanners and penetration testers. What do these two digital security roles have in common, whe…

How to remember the OSI 7 model in order

Remembering the OSI 7 Model – Mnemonics The order that the different layers of the Open Systems Interconnection 7 model are found in matters hugely; needless to say you in certain IT roles you cant afford…

What is a TCP SYN Flood Attack (DoS)

Today we’re looking at a specific type of DoS attack; the SYN flood denial of service attack. Although this type of attack can just as equally be performed as a DDoS attack, the examples we’ll use a…

Explaining Denial of Service Attacks

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of …
Read Blog »

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+