Whispers & Screams
And Other Things
Vastly experienced, versatile senior technical asset with a broad range of highly evolved skills from team building to high-level technology solution implementations. A courageous and tenacious leader with proven experience in business development, organisational visioning, cutting edge information technology deployments, and as a senior management liaison. Experienced at working at all levels from Start-up to Corporate, I thrive on change and take the lead to engage and drive the engineering landscape in any business An outgoing personality, with high energy levels who is customer focused but understands the need for a structured approach to business. A mature and collaborative style provides excellent communication and presentation skills and, drawing on past experience, gives the credibility to build trust. A strategic thinker, who is innovative and creative and makes technically 'savvy' decisions and encourages others to do so, whilst totally focused on success and how this drives results.

Willow

The lone wolf is weak, the wolf pack is strong. This thought seemed odd. Weakness was not something to be celebrated, it was ultimately something that needed to be dealt with - to be corrected. Instinct tells every creature on this planet that in order to survive one has to fight, to be brave and strong but the implication was dreadful. The world is constantly on the attack, it wants to steal your power, your resources even your life. 

Continue reading
283 Hits
0 Comments

Hardening The Joomla Backend

If like me, you manage one or more Joomla websites, you will no doubt be aware of the sorry lack of user friendly documentation and the appalling lack of a powerful native log facility. This seems to me to be an enormous oversight on the part of the developers however it is possible with a little jiggery pokery to get the information you need. 

I noticed recently that there were enormous amounts (1500 per day) of failed login attempts at the default backend URL (site.com/administrator/). This is to be expected of any installation like this however one cannot help but feel uneasy at the incessant minute by minute brute force dictionary attacks rolling by in the log. If your passwords are secure then you'll almost certainly be fine. If your administrator username is anything but admin, you'll be even better. Still I wasn't satisfied and I decided to call in the big guns.

Continue reading
326 Hits
0 Comments

Elegy Written in a Country Churchyard by Thomas Gray

The curfew tolls the knell of parting day, 

         The lowing herd wind slowly o'er the lea, 

The plowman homeward plods his weary way, 

         And leaves the world to darkness and to me. 

 

Now fades the glimm'ring landscape on the sight, 

         And all the air a solemn stillness holds, 

Save where the beetle wheels his droning flight, 

         And drowsy tinklings lull the distant folds; 

Continue reading
934 Hits
0 Comments

Passing Dynamic Arguments to Bash Scripts


It is possible to pass arguments to a bash script when it is called from the command line. This is the technique to use when you need to have your script carry out different actions each time it runs dependent on the input and the context. This is done by passing selected parameters to the file on the command line and these parameters are called arguments.

Lets look at an example, you may have a script called "graph.sh" that performs a particular operation on an RRD file, such as extracting the data. If you want to be able to use that script on many RRD files in many different user directories, it is best to pass the file path as an argument, so that you can use the same script for all the files to be processed.

Continue reading
1220 Hits
0 Comments

Spread Spectrum Modulation Techniques

As an ex military satellite communications engineer I certainly remember working with spread spectrum modulation and also frequency hopping technology in the 1980's. Wireless Local Area Networking technology today exploits a technology which was thitherto mostly hidden inside this shadowy domain of military communications and radar. This technology comprises a collection of ideas which are termed Spread Spectrum Techniques (SST). Spread Spectrum techniques have some powerful properties which make them an excellent candidate for networking applications. To better understand why, we will take a closer look at this fascinating area, and its implications for networking.

Continue reading
1646 Hits
0 Comments