I recently purchased a Turing Pi to have a play around with (you can currently pre order it, be warned once gone I suspect it wont be back). The Turing Pi allows you to make use of upto 7 Raspberry Pi Compute Modules on a relatively easy to use main board. The board allows you to easily network the Compute Modules together through an internal switch. The board is perfect for teaching yourself technologies such as Kubernetes (which I plan on playing with now).
A word of caution, the processing power per buck you can acheive from a setup using…
Over the years many debates have arisen on why one language is better than another. Sometimes disagreements are based on language features, history of the language and frequently out of sheer loyalty for the language that the people involved use day in day out.
Here is why I do not believe such arguments are helpful.
First let me give you a bit of background.
Much of my schooling was in the mid 80’s to mid-90’s. Like many people my age, my interaction with PC’s was very limited. In high school, when taking your options, it was extremely difficult to get…
Some time ago I wrote an article entitled “I Opened My Connection To SSH Attacks, And These Were The Requests I Saw”, although I knew that there would be a significant number of attempts at gaining access too my SSH server, I really did not appreciate the sheer numbers that would be involved (over 100,000 attempts in 7 days).
SSH is a significant risk to your network security if not secured properly, that being the case what can you really do to secure it.
In this article we will look at methods you can use to help secure the SSH…
Recently I attended the Scotland PHP conference. Like many conferences, Scotland PHP offer workshops, I am a bit of a sucker when it comes to workshops and this year I took the bait yet again.
There were 3 tutorials to choose from but ultimately I chose a workshop called “PHP Internals Deep Dive”. The workshop was presented by Derrick Rethans. If you do not know the name I am certain you will know some of his work. Derrick is responsible for several projects including the PHP Internals podcast, the Vulcan Logic Dumper, but most notably, Xdebug.
As with most developers, web developers (including myself) tend to find a solution that works, and we stick with them. Invariably this tends to be the LAMP stack:
MySQL / MariaDB
Sure, some of us stray to another database such as PostgreSQL, or maybe another web server such as Nginx, granted the vendors may change but the basis of the underlying technology is fairly similar.
A while ago I wrote an article describing how to “Install Raspbian on a Raspberry Pi”. I was recently required to install CentOS instead and thought I would rewrite the article describing how to install CentOS on an SD card ready for a Raspberry Pi.
It has now been a couple of weeks since writing this article. Benji Rogers has posted an update on his personal medium page. Unfortunately, the inevitable has happened. Pledge Music will shortly be placed into administration. This would suggest that artists owed money are unlikely to recoup their losses.
Today marks the 2 month anniversary since the last Pledge Music status update regarding the current debacle (This post was scheduled to go public at the exact time, to the minute).
Pledge Music is a direct artist to fan marketplace. Its promise? To bring artists closer to their fans. Artists would…
Please note, what follows is not a paid ad. This is my honest opinion of the tool. At present, I am using the Pro Demo but will be unlocking the license imminently.
When working with databases it is easy to initially design a database. This can be completed with a multitude of tools, however, the complication arises when you have (as you should) separated development and live environments.
In the past I have used many tools with MySQL however, on the whole, these are either amateurish at best or extremely buggy.
Then I found DBForge, this has solved many issues…
Recently I decided to investigate the type of requests that I would receive if I had opened up SSH to the world. The following are the results of that investigation.
The SSH service was being run on a Raspberry Pi and was the sole device on the internet connection. The internet connection itself was a standard residential broadband DSL service. At no point was a domain pointing towards the IP. Any SSH requests were speculative.
At this stage, I was only interested in the login attempts rather than what was trying to be done if a connection had been established…
A few weeks ago I became curious as to what types of credentials were being attempted on SSH. I came up with the idea of creating a honeypot and capturing what credentials were attempted, when they were attempted and where the attempts originated from.
Some of you may not be aware of what a honeypot is. The following is taken from the Wikipedia definition:
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a…
I am a keen tech enthusiast with a strong interests in voice interaction and security.