Setting up Next DNS

  Setting Up Next DNS You might ask: “Don’t I already have DNS?”. The short answer is “Yes”, in most cases your ISP (the company that you buy your internet from) does give you a DNS which they own and can see and sell all of your data to third party companies. This give your […]

Read More… from Setting up Next DNS

Privacy Myths Debunked

Privacy Myths Debunked Many people have misconceptions when it comes to privacy and security. Many myths have circulate on the internet concerning them.  In this article –Privacy myths debunked – I have listed several and will try to explain why and how they are false. Here are just some of the more common ones:   […]

Read More… from Privacy Myths Debunked

Home surveillance systems debate

  Home surveillance systems debate An overview of the debate Home surveillance systems are everywhere now.  As of October 2022, nearly half of American households with broadband internet had a home security system, networked camera, video doorbell, or combination of them. That is a lot of cameras! The data is not stored in your home, […]

Read More… from Home surveillance systems debate

Self-Hosting at home

  Self-Hosting at Home When many people talk about self-hosting they are talking about a private server on the internet which is rented by you from a company that has servers. I am going to tell you about another way to think about self hosting. Do it at home right on your local network. It […]

Read More… from Self-Hosting at home

Cool Tech You Need

  Here is a collection of some of the cool tech that you need to take a look at. The list will be updated to keep it current. All Metal 7.0 inch Touch Screen Ultra-Light Mini Laptop At $449.99 (at the time of writing) this little laptop is one to put into your tool  kit. […]

Read More… from Cool Tech You Need

Threat Modeling for Individuals

What is Threat Modeling for Individuals? Threat modeling is a way of thinking about risk. It is not all technological solutions but they do play a role in thinking about how to mitigate or lessen the threats. When you think about defense, start with thinking about what you’re defending, and how valuable it is. Lets […]

Read More… from Threat Modeling for Individuals

Step-by-step guide – Home Network Diagram

  Home Network Diagram Part of the Home Cybersecurity series Once we have a good inventory of what is on our network, it is time to draw a diagram of what we have to get a good picture. Visualizing your home network with a home network diagram will help you to plan and visualize what […]

Read More… from Step-by-step guide – Home Network Diagram

Step-by-Step Home Network Inventory Guide

Step-by-Step Home Network Inventory Guide Article Two – Home Cybersecurity series Taking an inventory of your home network is the first step in getting your network under control. There is an old adage that you can’t control what you don’t know about, and the same is true for your network. You have to know what […]

Read More… from Step-by-Step Home Network Inventory Guide

Home Cybersecurity (Updated)

Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]

Read More… from Home Cybersecurity (Updated)

Pixelated Dwarf