Blog

AWS Cloud 22 Sep 2021 👁 16 views

How to Scale Cloud Consumption Without Costly Mistakes

Introduction This article follows on from the “Cloud Migrations Crusade” blog post… A single tenancy datacenter is a fixed scale, fixed price service on a closed network. The costs of the resources in the datacenter are divided up and shared out to the enterprise constituents on a semi-random basis. If anyone uses less resources than […]

Read more →
Open Source 18 Aug 2021 👁 62 views

How to Iterate the COM Running Objects Table in C#

Back in the day I had to do quite a bit of COM / .Net interop. For some reason (and I cannot remember what it was), I need to be able to enumerate the COM running objects table (ROT). I think it was to do with createboject/getobject and trying to synthesis a singleton for an […]

Read more →
Corporate Culture 12 May 2021 👁 40 views

Why Least Privilege Security Is a Lie: 3 Root Causes

In technology, there is a tendency to solve a problem badly by using gross simplification, then come up with a catchy one liner and then broadcast this as doctrine or a principle. Nothing ticks more boxes in this regard, than the principle of least privileges. The ensuing enterprise scale deadlocks created by a crippling implementation […]

Read more →
AWS Cloud 23 Mar 2021 👁 24 views

AWS S3 ETags: Verify File Integrity Using MD5 Hashes

I was playing with S3 the other day an I noticed that a file which I had uploaded twice, in two different locations had an identical ETag. This immediately made me think that this tag was some kind of hash. So I had a quick look AWS documentation and this ETag turns out to be […]

Read more →
AWS Cloud 10 Mar 2021 👁 33 views

SSH EC2-User Login Fix for WordPress Bitnami Instances

So after getting frustrated (and even recreating my ec2 instances) due to a “Permission denied (publickey)”, I finally released that the worpress builds by default as set up for SSH using the bitnami account (or at least my build was). This means each time I login using ec2-user I get: Being a limited human being, […]

Read more →
Cyber 25 Feb 2021 👁 29 views

SYN Flood Testing with hping3: A Practical Guide

Getting an application knocked out with a simple SYN flood is both embarrassing and avoidable. Its also very easy to create a SYN flood and so its something you should design against. Below is the hping3 command line that I use to test my services against SYN floods. I have used quite a few mods, […]

Read more →