Malicious Code Detection

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the attacker. Detection of malicious executables...
Ian Carnaghan
1 min read

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a...
Ian Carnaghan
1 min read

How to increase traffic to blog for free?

Starting a new blog is easy but making it popular is difficult. People find blogging as one of the easiest ways to make money...
Pramod
3 min read

Presenting Digital Evidence

Testifying and writing a report are both essential ingredients to a successful digital forensics investigation. Digital forensics personnel will potentially spend months of time...
Ian Carnaghan
1 min read

How to test WordPress plugins online without installing?

If your site is getting good traffic, and if a new version of the plugin you’re using has been launched, you’ll have the following two...
Pramod
1 min read

Confusion over Terminology

The terms risk, vulnerability and threat are often confusing and sometime interchangeable leading to a lack of understanding when presenting evidence. Risks are usually...
Ian Carnaghan
54 sec read

How to disable or noindex WordPress attachment pages?

Attachment page is the built-in feature of WordPress. When these pages are not handled correctly by the website owner, Google and other search engines...
Pramod
1 min read

Lessons Learned using Drupal’s Domain Access Module

Over the last few months my team has been developing microsites to accompany our main website. The requirements for these sites included having their...
Ian Carnaghan
4 min read