Firewall Analysis

I’ve been doing some “First Defence” analysis of the Two Up firewall. I was trying to work out the best way to visualise the data. I started with Pie Charts, then Bar Graphs. Whilst this was good for representing the larger chunks of data (Country, mostly), standard 2-D graphing meant the smaller parts were inconveniently […]

Pi as an OpenOCD JTAG dongle

I have been looking at problems with our WiFi at home. The Access Point is located in a fairly poor place in terms of radio propagation, so the network is extended over cable, using a second AP to increase coverage. The second AP is running a WRT variant, but it’s not working very well. I […]

Imagining in 3D

In my spare time, I like playing with maps. It is quite amazing just how much information you can portray in a simple image. You can reference volumes, places, differences – you can even create heat maps if you like. I’ve not moved any of my 2D maps over to the playground yet, but I […]

Social Graphing

I have recently revisited ways to visualise large, and complex data sets. As well as “traditional data”, I’ve ventured into “Social Graphing” too. This is the process of analysing data from Social Networks, and joining the dots to visualise links and interactions. This incredibly intricate data can be quickly assessed and categorised, highlighting areas of […]

Scamware, Scareware – BEWARE!

The influence for todays post comes from the Facebook Advert shown above. When using “reputable” sites, we expect the site owner to look after us. Of course, that’s a false expectation – a site owner using advertising as a revenue stream is really only protecting one thing: Their bottom line. Instead of scaring you into […]

The importance of e-mail security

The most recent Ransomware to hit the streets, Maktub, encrypts your files in seconds. The main infection vector – the e-terrorist’s favourite – Email. Fake invoice letters were sent out, following the compromise of at least one online database. Those who opened documents / clicked on links were infected. Several organisations reputations are in danger, […]

First Post

So, it seems that a good place to start any IT blog is with a post about Security. The Chief Constable of the Metropolitan Police – Essentially Great Britain’s most Senior Law Enforcement Officer – suggested that victims of bank fraud should not be reimbursed for their losses. Why? Because clearly victims of fraud have […]

Welcome

Welcome to the inaugral Two Up I.T. Blog post. Over time, this should become a tagged repository of tips, resources, views and links to interesting articles or projects. You are welcome to Register and Comment, however your first comments will be moderated to ensure you are not a spambot. I will not unreasonably deny an […]