Technology
-
Password Hygiene
I’ve been meaning to write this for a while, but I never have time. Think of this as a tutorial, rather than a rant. Today, we’re going to talk about password hygiene. Password hygiene is the process you use to keep your passwords safe. It’s just as important as brushing your teeth. Your passwords control all of your online life. You login to just about everything. Your various accounts have all kinds of information on them. Imagine how much about you someone could learn, if they read through your email. Or your Facebook account. Or your bank account. I’m not even talking about the damage that could be done. I’m…
-
Protect Your Privacy with a Secondary Email Address
Many moons ago, I signed up for a website called Have I Been Pwned. This website tracks your information, and if it shows up in a leak or hack, it notifies you. It’s a great tool, and I recommend you all use it, especially in our current times full of security breaches. Today, I got a notification that I had been leaked along with 1.4 billion people. Billion with a B. This leak included Full Names, addresses, IP addresses, etc.
-
Genetically Modified Organisms
GMOs. We’ve all heard the phrase. It’s some sort of nasty thing “they” are putting into our foods. They should put it on labels so we know what we are consuming. It’s unhealthy. It’s poison. It’s a plot by corporations to keep us docile. Or maybe it’s just food.
-
The October 2016 (DynDNS) DDoS Attack
A few weeks ago, a DDoS attack crippled the internet, affecting websites like Amazon, eBay, Twitter, and many, many more. It seems this was accomplished by turning IoT devices into a botnet. Most internet users know that these words exist, and they know that they mean things, but few actually understand what happened. So that’s what I’m going to talk about today. I’m going to break down the attack and offer suggestions on what can be done about it.
-
PSA: Use Signal
I’ve mentioned this app before to friends, but I really want to encourage EVERYONE to start using Signal. Here’s what’s going on. We are living in the most technologically advanced period in our history, so far. While technology continues to advance, and we are capable of doing so much more than we could a few years ago, many forget that our laws have not caught up.
-
Smart Mirror Build (Part 2: Software)
I recently made a smart mirror, and here’s how I did it. This article will be about the software setup. Part 1, will be about the hardware. Oh. And like 99% of the credit goes to Evan Cohen, and the people at http://smart-mirror.io/
-
Smart Mirror Build (Part 1: Hardware)
I recently made a smart mirror, and here’s how I did it. This article will be about the physical setup. Part 2, will be about the software. Oh. And like 99% of the credit goes to Joel Hawksley, and the people at http://smart-mirror.io/ .
-
Interview: Shannon Morse
It’s time for another interview. This time, I talked with Shannon Morse, to talk about technology, cyber security, and being nerds.
-
Server Build Part 3: Domain Level Ad-Blocking with Pi-Hole
Welcome back. So far, we have installed and setup XenServer on a rack mounted server. We’ve also installed a guest OS. Part 1 can be found here, and Part 2 can be found here. Today, we are going to install a domain level ad-blocker. I’ve been working on this stupid part for months. Literally months. I’ve had absolute no luck until a few hours ago, so I wanted to write my steps down before I forget. This has been an absolute nightmare.
-
Server Build Part 2: Setup and First Guest OS
I totally forgot I was going to do this. This is part 2 of my server build. Part 1 can be found here. So far we have the hardware, and have installed XenServer, which is a host OS that runs VMs. We installed the Management Console on a separate computer, and will be doing everything from here on out via the Management Console.