Friday, 13 February 2015

Realtime Probing

We have a Cisco 3945E as our WAN router as a test to see if we are vulnerable I added realtime log of denied access on the access rule associated with our WAN connection. The results were quite interesting. Here map below shows IP addresses being mapped in realtime over a 5 minute period.

Friday, 3 October 2014

Data Visualization and WPF

 I've been working on data visualization technigques in my spare time. My current project is Sunburst chart. In the example below I'm mapping the first 2 level of folders on my disk. Clicking a directory 'segment' drill down into the selected segment.

Wednesday, 1 October 2014

email 2 SMS for Android

I've just developed a Email SMS App for Android.

To summarise; you configure you app to look at your email inbox. The App then polls the inbox looking for an email with a specific subject line that the app knows about. Once it sees an email with the matching subject line it then parses the email body or a known structure i.e. SMS-MESSAGE SMS-PIN SMS-CONTACT  etc. If it manages to parse the information it validates the Pin code with a known pin code configured in the App. If the pin code matches it then sends the message to the list of parsed SMS contacts.So basically it's uses your mobile phone as a SMS relay. I'll be publishing the the App on Googles Play Store in the very near future.

For more information please visit Email 2 SMS

Tuesday, 30 September 2014

This sums up man

Reading this article reminds of this video. When are humans going to control their own population?

Wednesday, 22 January 2014

Office 365 Migration

I've just migrated our companies 150+ users from on premises Exchange 2010 to Office 365. I was responsible for managing and executing the migration. We have had to re-engineer our LOB Applications that generate business email to go through a new Email Gateway Application that I developed. On the whole the migration went to plan apart from Outlook 2010/outlook 2013 where port 443 was getting blocked by our Kaspersky anti-virus software. Just need to sort out Retention Policies, Password expiry and Email delegation. I need to address a few points with: Email Delegation Retention Policies Password Expiry

Wednesday, 13 November 2013

Building Hackintosh with Mavericks

A basic recipe for cooking up Mac OS X Mavericks on a PC.

1 8Gb or more USB
1 Mac OS Compatible PC
1 Copy of Myhack
1 Retail Copy of Mac OS X Mavericks
The ability to stomach kext files and unix.
1 Mac or Hackintosh already setup and running
1 Copy of Multibeast

Carefully configure your PC Bios settings as follows.
  • Disable Quick Boot.  
  • Configure SATA as AHCI
  • Change boot order of drive make USB highest priority

Now format you USB an a Mac using Disk Utility, make the 1 partition with Mac Journal settings.

Now copy your Retail Mac OS to the desktop.

Run MyHack 

Use Myhack to navigate to the copy of Mac OS on the desktop (Alternatively you can copy it to Applications).

After MyHack has finished creating the USB open the USB using finder navigate to System/Library/Extensions Remove files beginning with AppleIntelHD*

Place the USB in your new PC ready for Hackintosh and boot, select -v (verbose).
Hopefully all being well you should have a new hackintosh PC.

Use Multibeast to fix kext files for audio, video etc.