Yep, the title explains it all. I'm putting my first Minecraft world up for download. This world was created in Minecraft 1.4.2 in 2012. It was then updated to MC 1.6 then 1.7.10 then 1.8.9. I stopped building in this world 2 years ago when I became interested in resource packs. The world is supposed … Continue reading Download my first Minecraft world
On Sunday 10th July 2016 at 03:00 GMT, Kaspersky Internet Security for Android detected 2 pieces of malware on my device within a pirated version of Minecraft Pocket Edition. (Yes I pirate games if I have to) 10 minutes later, the scan finished and KIS stated that it had found one malicious app running in … Continue reading How I dealt with the Ztorg Android Malware
I now see a lot more people using password managers and other people starting to generate random passwords for different services, but is storing passwords in a password manager a good idea? Password managers work by storing the users password in a heavily encrypted form on either the users PC or an internet service. Keep … Continue reading Password Managers and Storing Passwords
Scams are all over the internet. All of them socially engineer vulnerable people into believing them. Here is a list of how to spot some of the most common used on the internet! Websites that say "You have won the lottery" or something similar are almost always scams. There are rare cases where it just … Continue reading Scams, Phishing and Web Forgery.
UPDATE: The vulnerability isn't actually patched. The Session ID just doesn't get printed to the log files any more. On the 3rd March 2016, Mojang (The developers of Minecraft) released a new version of the Minecraft Launcher. Not much is known about what has changed between the old launcher version and the new launcher … Continue reading Yet Another Minecraft Vulnerability!
The '101' part of the title is unnecessary. I just added it, because why not? This blog post will just be a set of rules and guidelines for storing passwords and making sure that the users credentials are safe. The Password Entry Page Do not embed secure password pages on other insecure pages, this defeats … Continue reading Password Handling 101
Many people use adblock (Including me) and I noticed that a lot of businesses are stating that adblockers are bad and people should not use them. Don't listen to it. Adblockers provide an important role in security for blocking compromised adverts, malvertising, clickjacking and malicious web resources, which will infect users with all sorts of … Continue reading Adblock can be good for you
If you are wondering why I am re-writing this blog post, it is because the old version was terrible and didn't explain it very good. State-sponsored attacks / incidents are where government organizations target and attack certain companies such as Google or Facebook and try to steal personal information. This information often contains things which … Continue reading What are state-sponsored attacks?
Malware can spread in many different ways. This blog will explain most of the different methods and how they are used. The World Wide Web The World Wide Web is used in a number of ways to spread malware and infect vulnerable people. One of the most common techniques is to trick the user into … Continue reading The Methods of Spreading Malware
This post is just a bunch of ramblings. Feel free to leave if you dont want to be bored out of your mind 😉 This blog has been inactive for around a month or two and that was because I was burnt out from doing it. During that time, there were many things I wanted … Continue reading Ramblings