Paul Scarlett Personal Website
open-menu closeme
AWS Proof of Concepts
Cyber Security
Commodore 64
github youtube linkedin tryhackme
  • The Onion Router (Tor): How It Works

    calendar Oct 25, 2025 · 8 min read

    When privacy‑savvy internet users talk about “the onion,” they’re usually referring to Tor, the open‑source network that routes traffic through multiple encrypted layers


    Read More
  • The CIA Triad: Why Confidentiality, Integrity, and Availability Matter to Everyone

    calendar Oct 18, 2025 · 5 min read

    When you hear “CIA,” you probably think of espionage. In information security, however, the CIA triad stands for Confidentiality, Integrity, and Availability


    Read More
  • The UK’s Cyber Essentials Scheme: An Overview

    calendar Oct 18, 2025 · 4 min read

    In today’s hyper‑connected world, cyber‑threats are no longer a niche concern—they affect businesses of every size, public sector organisations, and even individual citizens.


    Read More
  • The SID Chip

    calendar Oct 12, 2025 · 9 min read

    When the Commodore 64 (C64) arrived in 1982, its most celebrated feature wasn’t the 64 KB of RAM or the colorful graphics—it was the Sound Interface Device (SID) chip


    Read More
  • The Evolution of Hacking: From Curious Explorers to Modern Cyber‑Criminals

    calendar Oct 11, 2025 · 10 min read

    Hacking began as a form of playful curiosity—people probing the limits of emerging computer systems.


    Read More
  • Beginners guide to VPNs

    calendar Oct 4, 2025 · 5 min read

    In today’s hyper‑connected world, our online activities leave a trail of data that can be harvested, tracked, or intercepted at almost any point along the route.


    Read More
  • Understanding Firewalls 101

    calendar Sep 28, 2025 · 5 min read

    In today’s hyper‑connected world, a firewall is often the first line of defense against unwanted traffic, malware, and data breaches.


    Read More
  • How to spot a phising email

    calendar Sep 20, 2025 · 5 min read

    Phishing attacks rely on a simple premise: trick you into treating a malicious message as trustworthy.


    Read More
  • Anti‑Virus & Malware 101

    calendar Sep 13, 2025 · 7 min read

    Malware (short for malicious software) is any program designed to infiltrate, damage, or exploit a computer system without the owner’s consent


    Read More
  • Password Security in 2025 – Proven Strategies Backed by the National Cyber Security Center

    calendar Sep 13, 2025 · 6 min read

    In a world where our lives are increasingly lived online—shopping, banking, collaborating, and socialising—passwords remain the first gatekeeper protecting our digital identities.


    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • »
    • »»

Featured Posts

  • About Me
  • Cyber Security 101
  • AWS Intro

Recent Posts

  • Regulatory Compliance and Cyber Security
  • Strengthening Cloud Security Management – A Comprehensive Guide for Modern Enterprises
  • Security Posture Management
  • Deep‑Dive – A Technical Primer on Everyday Cyber‑Security for the Savvy User
  • The Human Factor – Why People Remain the Weakest Link in Cybersecurity (An In‑Depth Exploration)
  • Info Stealers: The Hidden Threat Lurking Behind Everyday Digital Interactions
  • Zero Trust in cyber security
  • The  3 A’s of Cybersecurity: Building Trust, Control, and Visibility
  • Unleashing the Unexpected – How the VIC‑II’s Quirks Powered the C‑64 Demo Scene
  • The Onion Router (Tor): How It Works
Copyright © 2023–2025, Paul Scarlett and the Hugo Authors; all rights reserved.

Copyright  COPYRIGHT © 2023–2025, PAUL SCARLETT AND THE HUGO AUTHORS; ALL RIGHTS RESERVED.. All Rights Reserved

to-top