Homepage
Open in app
Sign in
Get started
TECH BLOG
About THG
Careers
Follow
Morello and memory pools
Morello and memory pools
The team has been working on a project as part of UKRI’s Digital Security by Design research. Our work has been focused on mitigation of…
Kev Jackson
Sep 14, 2023
Using Capabilities
Using Capabilities
The Linux Kernel started introducing ‘capabilities’ all the way back in kernel 2.x. BSD has a similar (though different) concept using the…
Kev Jackson
Sep 14, 2023
Designing Test Automation
Designing Test Automation
As part of the development for the Soteria security research project, we needed to build a regression test platform that was independent of…
Kev Jackson
Jul 4, 2023
Linux kernel & driver exploration
Linux kernel & driver exploration
Recently at THG, we have been working closely with linux internals to develop networking software required as part of a security research…
Kev Jackson
Mar 22, 2022
Fingerprinting Network Packets
Fingerprinting Network Packets
Following on from looking at DDoS attacks in general, our next task as part of the Soteria research project, was to categorise packets…
Robin Cowley
Feb 21, 2022
Remote Access
Remote Access
The current world situation has accelerated the steady move to more remote working for employees. Tech companies are naturally in the…
Kev Jackson
Jan 5, 2022
Anatomy of DDoS attacks
Anatomy of DDoS attacks
As part of the Soteria research project at THG, we needed to look at DDoS attacks, their features and how to generate the amount of traffic…
Kev Jackson
Dec 6, 2021
About THG Tech Blog
Latest Stories
Archive
About Medium
Terms
Privacy
Teams