Portfolio
-
Fifty Shades of Grey: CyberSEC Lab
Penetration Testing (Attacker & Targets). You need something to break in from (attacker) & something to gain access into (targets).
-
Transmission BitTorrent App Infects OS X With First Ransomware:
InfoSec
If you recently installed Transmission version 2.90 onto your Apple system, you might have infected yourself with some time-delayed ransomware.
-
Your iPhone will Alert You if You are Being Monitored
InfoSec
It's quite possible that someone has been reading your messages, emails, listening to your phone calls, and monitoring your activities.
-
-
Twitter: Bugs and Vulnerability found
InfoSec, Videos
I have tested twitter app and found many bugs but this is very interesting Vulnerability check this video :)
-
iPhone 5 Bugs Detected
InfoSec, Videos
I Found bugs on the scrollbar and text editor.
-
I found another bugs on Facebook
InfoSec, Videos
Facebook experiencing some weird flickering bug. See closer on this video, the page flicks, its a minor bug on Facebook.
-
IT Security Specialist
Videos
Be a Hero...Be an IT Security Specialist- The Most Dangerous Weapon in the world is a Computer
-
Google’s XSS Challenges
InfoSec, Videos
How To resolve google's xss game challenges
-
Queen Mary University Lecture
Videos
The MSc in Cyber Security and Management is designed for those wishing to develop a career as a cyber security professional
-
DDOS Attack in Action
Videos
Massive DDoS Attack, on June 20, 2014 Facebook (继续遭到大规模DDoS攻击,2014年6月20日).
-
Pen Testing for Hitachi TV
InfoSec, Videos
Technical Security Diagnostics System Test and networks on Hitachi. I carried out Software Scan, as well as some manual analysis of port and System configuration.
-
DDOS Infrastructure
Videos
The April 23, 2013 we experienced a major DDOS on our infrastructures this how it looked like from logstalgia.
-
Staff Security Awareness
Videos
A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila.
-
Windows Admin Hacked via Linux
Videos
Windows Administrator Overrule via Linux
-
How to pick a proper password
I had a lecturer, he gave the following example: there are thousands of criminal organisations that want to take something from you.
-
Google Server Overload
InfoSec
The overload resulted in people around the world being unable to access Gmail for about 100 minutes
-
-
-
SQUARE MOBILE CREDIT CARD SYSTEM
Publications
2010 I run PCIDS systems hands on test, today its worth $6 Billion.
-
Cyber Warfare
Publications
Cyber warfare is growing threat- 2010 Technology Reviews: New Article
-
TIM BERNERS-LEE
Publications
Inventor of web criticizes Facebook and cable ISPs
-
WHAT’S HACKING
Publications
What does this have to do with computers? Originally, nothing. But there are standards for success as a hacker
-
SEO KEYWORDS RANKING
Publications
Learn why SEO tools are useless for evaluating your keyword position, and what tools to use instead!
-
IPHONE 4 SIGNAL FAILURE
Publications
The controversy over the iPhone 4's antenna issues continues to grow, every iPhone 4 suffers from signal
-
Apologetic Hacker – PlugX Malware
InfoSec
PlugX malware: A good hacker is an apologetic hacker
-
Petya Ransomware
InfoSec
I am sharing some notes about #Petya #ransomware (work in progress) Petya ransomware eats your hard drives.
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|