Self-Hosting at home

Self-hosting at home :: Keep you things private

  Self-Hosting at Home When many people talk about self-hosting they are talking about a private server on the internet which is rented by you from a company that has servers. I am going to tell you about another way to think about self hosting. Do it at home right on your local network. It […]

Read More… from Self-Hosting at home

Cool Tech You Need

  Here is a collection of some of the cool tech that you need to take a look at. The list will be updated to keep it current. All Metal 7.0 inch Touch Screen Ultra-Light Mini Laptop At $449.99 (at the time of writing) this little laptop is one to put into your tool  kit. […]

Read More… from Cool Tech You Need

Threat Modeling for Individuals

What is Threat Modeling for Individuals? Threat modeling is a way of thinking about risk. It is not all technological solutions but they do play a role in thinking about how to mitigate or lessen the threats. When you think about defense, start with thinking about what you’re defending, and how valuable it is. Lets […]

Read More… from Threat Modeling for Individuals

Step-by-step guide – Home Network Diagram

Home Network Diagram - how to visualize your home network

  Home Network Diagram Part of the Home Cybersecurity series Once we have a good inventory of what is on our network, it is time to draw a diagram of what we have to get a good picture. Visualizing your home network with a home network diagram will help you to plan and visualize what […]

Read More… from Step-by-step guide – Home Network Diagram

Step-by-Step Home Network Inventory Guide

step-by-step home network inventory - the first step in home cybersecurity

Step-by-Step Home Network Inventory Guide Article Two – Home Cybersecurity series Taking an inventory of your home network is the first step in getting your network under control. There is an old adage that you can’t control what you don’t know about, and the same is true for your network. You have to know what […]

Read More… from Step-by-Step Home Network Inventory Guide

Home Cybersecurity (Updated)

Home cybersecurity

Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]

Read More… from Home Cybersecurity (Updated)

Linux One Liner :: Organizing for 2024 at the command line

Linux One Liners

Organizing for 2024 at the command line Yes, you can use the power of the command line to help you to get ready for 2024. What I wanted was to make a file with all of the months in a few places (My overall schedule, Bills and Financial and such). I did it with one […]

Read More… from Linux One Liner :: Organizing for 2024 at the command line

Celebrating Ethernet’s 50th Anniversary

Ethernet @ 50

Celebrating 50 Years of Ethernet: The Backbone of Modern Connectivity On May 22, 1973, a groundbreaking technology was born that would forever revolutionize the way we connect and communicate. Ethernet, the underlying technology facilitating the transfer of data across networks, has now reached its momentous 50th anniversary. It was invented by Robert Metcalfe, David Boggs, […]

Read More… from Celebrating Ethernet’s 50th Anniversary

Randomize your MAC Address

Randomize your mac address in pop_os

  Why do i want to randomize my MAC Address? Giving out your MAC address is telling people information about your computer. Knowing information gives away your privacy and gives an adversary something to go on in breaking into your system. This is not a good idea. So, giving them a made up MAC address […]

Read More… from Randomize your MAC Address

What to Do After Installing Pop_OS

  I really am enjoying I just received a beautiful new Thelio Mira from System 76 (they don’t advertise here, but they make a great product and I highly recommend them). When I get a new computer I install the programs and add-ons that I want on it. POP_OS is great for this. It is […]

Read More… from What to Do After Installing Pop_OS