honeypot Playing with honeypots: part 4 Looking at a different attack on the honeypot I investigate an attempt to deploy a crypto currency miner.
work Releasing people from their old roles When changing roles in the same organisation you sometimes end up still doing your old job for a while.
honeypot Playing with honeypots: part 3 Having built a honeypot and published it to the Internet, it's time to see what the attackers tried to do.
honeypot Playing with honeypots: part 2 I build my honeypot in Microsoft's Azure cloud using open source software.
cyber security Receiving a security disclosure for an old subdomain After receiving a security disclosure from a security researcher I knew I needed to investigate.
review Review: Flexispot E6 sit/stand desk I'd heard standing desks could be much better for my body, so decided to buy one.
coronavirus Over a year of working from home After over a year of working from home, how have I got on?
fountain pen Review: Gazing Far tmX fountain pen In a departure from my normal tech blogging I'm reviewing my latest fountain pen acquisition - a Gazing Far tmX in rosewood. I didn't have a wooden pen in my collection, nor a pocket pen, so this was a way to kill two birds with one
elementary OS Switching to elementary OS - part two - applications After installing elementary OS I wanted to spend some time getting to know some of its native applications.
wargaming Wargaming: running incident response plan tests - part 3 Part two [https://blog.jonsdocs.org.uk/2021/04/18/wargaming-running-incident-response-plan-tests-pt2/] finished with our defenders heading in the right direction to find the simulated infection. They'll have used a combination of tools in order to get this far, likely including firewall and network logs. As a reminder, for
wargaming Wargaming: running incident response plan tests - part 2 The time has come to run your wargame, let's look at what happens on the day itself.
wargaming Wargaming: running incident response plan tests - part 1 Cyber exercising is important for checking how a team responds to an incident.
home automation Making a smart doorbell - part two Having built my proof of concept smart doorbell I move the parts inside the enclosure, and add an automation.
home automation Making a smart doorbell - part one As regular readers will know, I'm getting more interested in home automation [https://blog.jonsdocs.org.uk/tag/home-automation/] and have had Home Assistant running in the house for a while (it's just been doing very little). Unfortunately, my plan to use a humidity sensor to
cyber security The dangers of default credentials Default credentials are useful for logging in to systems initially, but shouldn't remain in place afterwards.
hacking my old blog Hacking my old blog: part 4, security fixes To finish off the series, I discuss some of the mechanisms that could have been used to protect my old blog.
development Android code clean-up: concatenating strings with setText The Android Studio code inspector is a useful tool for maturing your code and improving your style.
development Android: Opening URIs using Intent - protocol case matters Protocols need to be lower case in URIs used in Android, so why doesn' Android make sure they are?!
how to Transferring data from a miniDV camcorder using Linux Transferring data from old media is getting increasingly difficult.