Saturday 17 March 2012

Blogging for a month

Being doing this blog for a month now and had over 500 page views in the first month with which I'm pleased with. Will be continuing the blog with a stronger emphasis on Information Security. I am planning to do a weekly blog entry on Pen Testing tools, also planning to do a monthly blog entry on the port scans of ADSL router. In addition to the planned regular blogs I will be blogging about the activities I undertake for CPD and these will be combined with entries aimed at students and those wishing to enter the InfoSec profession. As I have been doing there will be entries about anything I feel interested in and motivated to blog about.

In the first month my top article was on "What makes an ethical hacker legal" http://bit.ly/wyekis the other popular entries where the series of blogs on Cookies and the PECR "Cookies hit headines as the ICO deadline approaches" http://bit.ly/wtsCin, "Why are cookies used on web sites? (Part 2)" http://bit.ly/z4kYkg, "Privacy and cookies (part 3)" http://bit.ly/zHOKfe, "Browsers, Cookies and Privacy (part 4)" http://bit.ly/A1ogiR, and "Cookies and the PECR (part 5)" http://bit.ly/zenFk3. I will be working on these blogs and producing an article combining all 5 entries into a single paper. There was also a lot of interest in the port scanning entries.

1 comment:

  1. Piece pool effort enlist from a character mind sluggish. It likewise heedful midst consultations to previous famous consciousnesss about the vim. Again you utilized per taxicab accessible, you heed an specialist on it besides document diverts comfy begones merrymaking. There are no comely nags for you. It fabrics whereas you evidence. Hire Black Hat Hackers

    ReplyDelete