This video extends the text-based menu developed in part 1 of this tutorial by adding a static method to display the menu items. It also separates the menu data from the display method by create arrays that store the menu options and item names. We also add prices to our menu by including a pricesRead more »

This video tutorial covers how to implement a very simple text-based menu driven program in Java. The tutorial uses basic programming constructs such as varaibles, input, ouptut, conditional blocks (if-statement) and a while loop in order to implement the menu. This video is the first in a series of videos that will build upon theRead more »

Perlin noise, developed by Ken Perlin for the movie Tron in the 1980’s, can be used to produce naturally ordered smooth sequence of pseudo-random numbers. For an in-depth explanation of how Perlin noise works you can check out a lecture by the man himself at http://www.noisemachine.com/talk1/. Perlin noise is heavily used in computer generated visualRead more »

I’ve been meaning to check out the Processing development tool in order visualise some of the topics I will be teaching as part of an upcoming Computational Intelligence course. I originally implemented the demo below in Java and was really interested to see how easy it would be to port it over to the ProcessingRead more »

I recently gave a talk on how DNS can be used for malware command and control and data exfiltration and in particular how DNS creates an exploitable hole in your firewall.

As part of my Ph.D. I’ve been looking at existing DNS-based covert channels in order to profile their behaviours with a view to developing a detector or filter. I have examined a few variations including DNScat and IODINE. Both of these implementations are fairly robust but IODINE is the more complete and reliable of the toolsRead more »

{Will update this as I go…} My recent work has focused on a particular form of DNS-based covert channel that encodes its payload into the slack space in DNS query names. Each ASCII character in a domain name is stored as 8 bits and is referred to as an octet. A fully qualified domain name (FQDN)Read more »

xxd is a very handy command line tool that converts its input (file or standard input) into hexadecimal output. I came across it when I was trying to figure out an easy to way to take some binary input and convert it to ASCII. From the xxd man page…

There is no doubt that Computer Security/Cyber Security or whatever you would like to call it has taken centre stage. If you follow security related social media feeds you will no doubt be familiar with the daily bombardment of breaking cyber security stories. If you read only a fraction of the feeds you will knowRead more »

Netcat is like the Swiss Army Knife of command line network tools. Netcat can read and write data across network connections using TCP or UDP. From a Pentest or security research point of view Netcat can be used to debug or explore networks since it can create almost any kind of connection.

« Previous PageNext Page »