A Back-to-Basics Approach
The approach is rooted in practical, proven principles—cutting through hype to deliver effective results without unnecessary complexity or cost.
The focus is on fundamentals over flashy vendor solutions, which often fail to address the real problem. For example, ransomware — a headline threat today — can be mitigated with technologies and strategies from 2007.
The ethos is simple: do the basics well—with clarity, honesty, and precision.
Services
Small to Medium sized business services
Cloud migration
SIEM
Threat and Vulnerability Management
Software Development
Explore the full range of services here..
Software
Netdelta
Detect perimeter changes before hackers detect them!
If your network perimeter changes unexpectedly, that's unlikely to be a good thing. What is the cause?
- Unauthorised change?
- Steve in networking misconfigured a firewall?
- Hacker's shell?
- Shadow IT?
- Rogue device?
- Post-M&A networking headaches?

Musang
Oracle Database Security Assessment
Authenticated vulnerability scanning for auditing, with a tests library based on 20 years of Oracle Database Security assessment.
- Oracle Database versions 10g, 11g, and 12c are supported.
- Vulnerability assessment - covering usual compliance requirements for PCI-DSS, HIPAA, etc.
- Covers TNS listener, auditing, passwords, user accounts and privileges, typical default security issues, and many more.
Contact Us
* required field
Security Macromorphosis
Rescuing an Ubuntu VM on Apple Silicon (Fusion + ARM)
June 22, 2025, 3:49 p.m.
LLMs are nowhere near this post.
I recently encountered a situation where my Ubuntu 24.04 VM was failing to boot. The blue screen DOS-style Boot Manager would be displayed and booting was halted here, with an implicit 'you shall not pass'. This post covers how i addressed the problem,
Here is my setup:
Publication

Security
De-engineering
Security De-engineering, published by Taylor Francis, covers ubiquitous problems in information security and offers a solution in the final chapter
Areas covered: Penetration testing, Hackers, CASEs (Checklists and Standards Evangelists), IDS, Cloud Security, jobs in security, Identity Management, and organisational elements.
Partners

Literatecode
Literatecode was established in 2003 as an informal R&D lab and reorganized to a registered business in 2012.
Literatecode specializes in applied research and experimental development to help companies and individuals defend themselves against security threats.