What is Threat Modeling for Individuals? Threat modeling is a way of thinking about risk. It is not all technological solutions but they do play a role in thinking about how to mitigate or lessen the threats. When you think about defense, start with thinking about what you’re defending, and how valuable it is. Lets […]
Step-by-step guide – Home Network Diagram

Home Network Diagram Part of the Home Cybersecurity series Once we have a good inventory of what is on our network, it is time to draw a diagram of what we have to get a good picture. Visualizing your home network with a home network diagram will help you to plan and visualize what […]
Step-by-Step Home Network Inventory Guide

Step-by-Step Home Network Inventory Guide Article Two – Home Cybersecurity series Taking an inventory of your home network is the first step in getting your network under control. There is an old adage that you can’t control what you don’t know about, and the same is true for your network. You have to know what […]
Home Cybersecurity (Updated)

Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]
Linux One Liner :: Organizing for 2024 at the command line

Organizing for 2024 at the command line Yes, you can use the power of the command line to help you to get ready for 2024. What I wanted was to make a file with all of the months in a few places (My overall schedule, Bills and Financial and such). I did it with one […]
Celebrating Ethernet’s 50th Anniversary

Celebrating 50 Years of Ethernet: The Backbone of Modern Connectivity On May 22, 1973, a groundbreaking technology was born that would forever revolutionize the way we connect and communicate. Ethernet, the underlying technology facilitating the transfer of data across networks, has now reached its momentous 50th anniversary. It was invented by Robert Metcalfe, David Boggs, […]
Randomize your MAC Address

Why do i want to randomize my MAC Address? Giving out your MAC address is telling people information about your computer. Knowing information gives away your privacy and gives an adversary something to go on in breaking into your system. This is not a good idea. So, giving them a made up MAC address […]
What to Do After Installing Pop_OS

I really am enjoying I just received a beautiful new Thelio Mira from System 76 (they don’t advertise here, but they make a great product and I highly recommend them). When I get a new computer I install the programs and add-ons that I want on it. POP_OS is great for this. It is […]
The Best Organization Apps for Linux

Getting your notes and to-do lists in order is one of the best ways to start getting more accomplished. Here are some of the best of the best when it comes to to-do list apps and note taking apps for Linux. I give you these to try out and find the ones that suit […]
Firefox tweaks for 2023

Make your Firefox browser even more secure with just changing a few settings. Awhile back, I wrote an article on tweaking some settings for your Firefox browser, since then Firefox has evolved some with new versions, so another updated article is needed. Here are some of the settings that you should consider changing to make […]