Ian Carnaghan

  http://www.carnaghan.com I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment. In my spare time I teach undergraduate classes in web development.

     



224 Stories by Ian Carnaghan

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be installed and hidden on a...
0 1 min read

Presenting Digital Evidence

Testifying and writing a report are both essential ingredients to a successful digital forensics investigation. Digital forensics personnel will potentially spend months of time...
0 1 min read

Confusion over Terminology

The terms risk, vulnerability and threat are often confusing and sometime interchangeable leading to a lack of understanding when presenting evidence. Risks are usually...
1 54 sec read

Lessons Learned using Drupal’s Domain Access Module

Over the last few months my team has been developing microsites to accompany our main website. The requirements for these sites included having their...
0 4 min read

Data Hiding and Steganography

The term ‘Steganography’ refers to ‘covered writing’ and encompasses methods of transmitting secret messages through innocuous cover carriers in a manner that their existence...
0 1 min read

Preparation Phase of a Digital Search

The preparation phase of digital search is the most important phase of the digital investigation process. If not carried out correctly, the can lead...
0 1 min read

Yet More Theft of Information Assets

It doesn’t seem that long ago that I received an official letter in the mail from the United States Office of Personnel Management (OPM)...
0 1 min read

Important Cybercrime Laws

There are a number of cybercrime laws that are extremely important in the field of digital forensics and cybersecurity as a whole. Two of...
0 1 min read

DNS Rebinding and Intrusion Detection with Contextual Signatures

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of contextual signatures with Intrusion Detection...
0 8 min read

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of the most challenging threats in...
0 9 min read

Get Hostgator Black Friday 2016 discount – best deal of the year

As a newbie blogger, I kept changing my hosting provider until I signed up for HostGator. To be honest, I had faced a hard...
0 1 min read

Common Bluetooth Vulnerabilities to be Aware of

Bluetooth connectivity has grown immensely in popularity with mobile devices in the last number of years. The convenience factor of being able to have...
0 1 min read