My election statement for BCS Council

Here is my election statement as a candidate for BCS Council. Track my progress on my candidate page.

Continue reading

Posted in Uncategorised | Tagged | Leave a comment

Applying for Chartered IT Professional (CITP)

I thought I’d write up my experience of applying for Charted IT Professional (CITP), through the BCS. I recently secured this, slightly overdue, qualification and thought it would be a useful exercise to write some notes up on my blog in case there are any others seeking something similar.

Continue reading

Posted in Uncategorised | Tagged , , , | Leave a comment

Richard Gunstone – Your Voice in Council

I’m running for election to the Council of the BCS, The Chartered Institute for IT.

Find out more and get updates from my blog here and my candidate web page.

Posted in Uncategorised | Leave a comment

Before You Connect a New Computer to the Internet: advice from US-CERT

A good set of notes for end users, which would work well in a corporate awareness programme:

https://www.us-cert.gov/ncas/tips/ST15-003

Posted in Uncategorised | Comments Off on Before You Connect a New Computer to the Internet: advice from US-CERT

Thoughts on Certified Ethical Hacker v10

I recently undertook this certification. Long overdue, I had an opportunity to pursue CEH over a decade ago, but opted to take the Red Hat Certified Engineer (RHCE) Standard Track at the time. How did it go?

Continue reading

Posted in Uncategorised | Tagged , , , , , | Comments Off on Thoughts on Certified Ethical Hacker v10

Active fingerprinting of remote systems using standard enterprise tools

NMAP has some useful active fingerprinting capabilities, sending a variety of packets and carrying out evaluation of virtually every packet bit. It is a great help if you have nothing more than an IP address to go on, and need to quickly narrow down the platform type (e.g. using nmap -O -sV ).

Continue reading

Posted in Uncategorised | Tagged , , , , | Comments Off on Active fingerprinting of remote systems using standard enterprise tools

A few thoughts on Dot EU and Brexit

Here’s a summary of my advice on LinkedIn regarding the Dot EU domain and Brexit.

Continue reading

Posted in Uncategorised | Tagged , , , | Comments Off on A few thoughts on Dot EU and Brexit

Detecting and/or mitigating rapid exfiltration of RDBMS data

In this post I wanted to explore some of the lesser used features of iptables, and showing how iptables can be combined with a dual-homed Linux server to act as a data rate control. This is a cheap alternative to using a dedicated firewall.

Continue reading

Posted in Uncategorised | Tagged , , , , , , , , | Comments Off on Detecting and/or mitigating rapid exfiltration of RDBMS data

Logging outbound TCP connections on Linux servers

In my experience, you can never have enough logging information. If you’re trying to piece together the causes of system failure, or attempting to trace the origins of a cyber-attack, you’re logs are often crucial in either case. In this post I’ll show how you can enhance a Linux installation to log all outbound TCP connections for future reference.

Continue reading

Posted in Uncategorised | Tagged , , , , | Comments Off on Logging outbound TCP connections on Linux servers

Capitalising on security-relevant Squid ACL types

Squid is a capable proxy, and can be used to enforce security rules for small and medium sized organisations. It’s also a cost-effective solution, e.g. if you’re implementing AP17.

Continue reading

Posted in Uncategorised | Tagged , , , | Comments Off on Capitalising on security-relevant Squid ACL types