Last Updated on June 18, 2022 welcomes submissions from any technically qualified authors, payment is sometimes paid depending on the subject matter and relevant qualifications.

Our Main Authors/Regular Contributors

Jim Greenhoff

Jim has been working in IT for over 25 years in a variety of roles. In the last decade he has specialized mainly in the security arena particularly in securing windows based infrastructures. He specializes in Active Directory and securing DNS configurations. He has held several industry recognized qualifications including MCP, MCSE and CISSP for many years.


Operates under a pseudonym and is a rehabilitated hacker.  A member of various security and hacking groups spreading over two decades Jensun is a skilled programmer and specializes in in-depth penetration testing. He has an interest in privacy, free speech and keeping the internet open and equal to all.  As such he’s a great fan of using proxies and VPNs in order to protect access and privacy online.