Service Offerings
- Cyber security training
- Product reviews
- Blog or article writing
- Cyber security consulting for SME & HNWI
Chapter Author
Contact Graeme
Journalists, students, potential clients or anyone else, email.......
graeme@datasecurityexpert.co.uk
Something private to say?
PGP public key
graeme@datasecurityexpert.co.uk
Something private to say?
PGP public key
No AI Used Here
Can encryption protect your secrets against “APTs” and web exfiltration? Well, it depends...
- Details
- Category: Cyber Security (Personal)
Take a standard website for instance, you create a free account, enter your chosen password, the passwords flies over HTTPs (SSL/TLS) and the password is transformed into a hash (MD5, SHA1/2/3 etc.) and stored as that. “000ca7b75084509a58de17c003c5” is what a hash looks like if you are wondering. The password is not usually stored in clear text (readable English). Hack the websites database and you get a load of odd looking strings which people think are “one-way”. Mathematically yes but if you have one million passwords you can generate one million hashes and compare them. Also known as: rainbow tables.
You may shred your printed matter but what about your files?
- Details
- Category: Cyber Security (Personal)
Survey: 40% of hard drives bought on eBay hold personal, corporate data sums this up well. People and companies may have deleted their files or formatted the drive but the files could be recovered with off the shelf software.
Just how easy is it to recover files.....?
![]() |
![]() |
| Blank USB stick with a single 1KB TXT file on. | TXT file showing 321 as contents. |
![]() |
![]() |
| Deletion confirmation window. | Empty looking USB stick. |
![]() |
![]() |
| A five second scan with free recovery software shows the deleted file available for restore. | Recovered file shown on desktop and exactly the same as before it was deleted. |
How do I ensure files cannot be recovered?
Various options exist including: physical shredding, physically punching holes, shredding individual files, overwriting the entire drive or even putting the whole drive in a furnace!
We have found a possible IED (bomb) left suitcase, let’s move it around and open it!
- Details
- Category: Cyber Security (Personal)
One of the three men were wheeling in a suitcase to the ticket hall control room, then the TFL staff member pointed at it, the officer examined it from the outside and then started to unzip it. What has just happened? In my view the station staff have found an unattended suitcase, they moved it manually to the control room and then called a BTP officer to help... who looks at it and starts to open it.
Hello!!! This could have been a real IED (improvised explosive device) or bomb in old fashioned English thus moving it around and opening it is not a good idea.
Page 29 of 60






