Girl in a jacket

Paula Livingstone

. com

Optimist / Engineer / Adventurer

Hi and welcome. This website is my home on the web. Its main function is to act as a useful resource for me to gather my thoughts. Ive split those around four main key areas. Dream, Learn, Inspire and Grow. These are the cardinal compass points of life and everything maps into that landscape as some combination of the four. Im currently studying an MSc in Cyber Security at The Open University researching Distributed Ledger Technology (Blockchain) and Cryptography.
This site is also something of a personal website into which I will post blogs and other things so, if its of interest to anybody else then welcome and please do get in touch if you feel so inclined. The many possible ways are in the contact page or simply click here.

What's Hot

Friday, November 12, 2021 Paula Livingstone Learn No comments
The Internet was developed as a military system first and foremost and, as is often the case, the subsequent utility it has more recently afforded peacetime humanity is only a fringe benefit. The ...
Sunday, October 31, 2021 Paula Livingstone Uncategorised No comments
The video on the right is about ten years old but the techniques described are evergreen. Wifi – man in the middle attacks, web based client side injection attacks, USB flash drive mal...
Friday, September 17, 2021 Paula Livingstone Uncategorised No comments
—–BEGIN PGP PUBLIC KEY BLOCK—– Comment: User-ID: Paula Livingstone Comment: Created: 17/09/2021 21:06 Comment: Expires: 17/09/2023 12:00 Comment: Type: 3,072-bi...
Monday, July 19, 2021 Paula Livingstone Uncategorised No comments
In the world of digital forensics, “file carving” is the act of recovering deleted files from fragments which are either left behind on a fragmented hard drive or by-products of a part...
Thursday, October 08, 2020 Paula Livingstone Inspire No comments
One of the major fundamentals of the doctrinal training of commanders in the British Army is what is known as The Combat Estimate. The Combat Estimate, when applied to a situation, provides a sy...
Friday, February 28, 2020 Paula Livingstone Uncategorised No comments
In this post Ill take a very brief and broad look at some of the core principles and fundamental aspects of cryptography. As a practice it has been around for as long as humanity itself but as a s...
Friday, August 02, 2019 Paula Livingstone Uncategorised No comments
The attributes of symmetric encryption What makes encryption symmetric? You know what symmetry is right? So you can hazard a guess… Symmetric encryption algorithms use the same key for bo...
Saturday, March 18, 2017 Paula Livingstone Uncategorised No comments
Having recently completed my latest study on the subject of “Natural and Artificial Intelligence“, I became aware of advances made in the recent decade towards a new paradigm of network ...

What's New

Friday, November 12, 2021 Paula Livingstone Learn No comments
The Internet was developed as a military system first and foremost and, as is often the case, the subsequent utility it has more recently afforded peacetime humanity is only a fringe benefit. The ...
Sunday, October 31, 2021 Paula Livingstone Uncategorised No comments
The video on the right is about ten years old but the techniques described are evergreen. Wifi – man in the middle attacks, web based client side injection attacks, USB flash drive mal...
Friday, September 17, 2021 Paula Livingstone Uncategorised No comments
—–BEGIN PGP PUBLIC KEY BLOCK—– Comment: User-ID: Paula Livingstone Comment: Created: 17/09/2021 21:06 Comment: Expires: 17/09/2023 12:00 Comment: Type: 3,072-bi...
Monday, July 19, 2021 Paula Livingstone Uncategorised No comments
In the world of digital forensics, “file carving” is the act of recovering deleted files from fragments which are either left behind on a fragmented hard drive or by-products of a part...
Thursday, October 08, 2020 Paula Livingstone Inspire No comments
One of the major fundamentals of the doctrinal training of commanders in the British Army is what is known as The Combat Estimate. The Combat Estimate, when applied to a situation, provides a sy...
Friday, February 28, 2020 Paula Livingstone Uncategorised No comments
In this post Ill take a very brief and broad look at some of the core principles and fundamental aspects of cryptography. As a practice it has been around for as long as humanity itself but as a s...
Friday, August 02, 2019 Paula Livingstone Uncategorised No comments
The attributes of symmetric encryption What makes encryption symmetric? You know what symmetry is right? So you can hazard a guess… Symmetric encryption algorithms use the same key for bo...
Saturday, March 18, 2017 Paula Livingstone Uncategorised No comments
Having recently completed my latest study on the subject of “Natural and Artificial Intelligence“, I became aware of advances made in the recent decade towards a new paradigm of network ...

What's Cool

Friday, November 12, 2021 Paula Livingstone Learn No comments
The Internet was developed as a military system first and foremost and, as is often the case, the subsequent utility it has more recently afforded peacetime humanity is only a fringe benefit. The ...
Sunday, October 31, 2021 Paula Livingstone Uncategorised No comments
The video on the right is about ten years old but the techniques described are evergreen. Wifi – man in the middle attacks, web based client side injection attacks, USB flash drive mal...
Friday, September 17, 2021 Paula Livingstone Uncategorised No comments
—–BEGIN PGP PUBLIC KEY BLOCK—– Comment: User-ID: Paula Livingstone Comment: Created: 17/09/2021 21:06 Comment: Expires: 17/09/2023 12:00 Comment: Type: 3,072-bi...
Monday, July 19, 2021 Paula Livingstone Uncategorised No comments
In the world of digital forensics, “file carving” is the act of recovering deleted files from fragments which are either left behind on a fragmented hard drive or by-products of a part...
Thursday, October 08, 2020 Paula Livingstone Inspire No comments
One of the major fundamentals of the doctrinal training of commanders in the British Army is what is known as The Combat Estimate. The Combat Estimate, when applied to a situation, provides a sy...
Friday, February 28, 2020 Paula Livingstone Uncategorised No comments
In this post Ill take a very brief and broad look at some of the core principles and fundamental aspects of cryptography. As a practice it has been around for as long as humanity itself but as a s...
Friday, August 02, 2019 Paula Livingstone Uncategorised No comments
The attributes of symmetric encryption What makes encryption symmetric? You know what symmetry is right? So you can hazard a guess… Symmetric encryption algorithms use the same key for bo...
Saturday, March 18, 2017 Paula Livingstone Uncategorised No comments
Having recently completed my latest study on the subject of “Natural and Artificial Intelligence“, I became aware of advances made in the recent decade towards a new paradigm of network ...