Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]
Category: Computing
General computing and hardware.
Using CISSP to help secure your home network
Using CISSP to help secure your home network I am enrolled in a Cybersecurity class right now and as with most courses I take I get to thinking about how to apply what I am learning to my own life. So I thought about how to take the Certified Information Systems Security Professional (CISSP) Domains […]
Read More… from Using CISSP to help secure your home network
Best privacy and security apps for Linux
Here are some of the best of the best security and privacy apps for Linux. Using Linux means that you value security and privacy. Here are some of the best FOSS (Free and Open-Source Software) that I have come across. Download them and check out some great programs to keep you safer on the internet. […]
The folly of banning the Tic Toc app
Why the Tic Toc app won’t work: The United States Congress is currently debating and investigating Tic Toc. There is little doubt that Tic Toc and their practices at shady and do not benefit the US citizens. ByteDance, the company that owns Tic Toc operates at the pleasure of the Chinese Government and by law […]
Getting Smart With: PASS – the command line password manager
Getting Smart With: PASS – the command line password manager PASS is a password manager that uses the command line in Linux to create encrypted files for the sites that you visit. PASS was designed for simplicity and adheres to the Unix philosophy. With PASS, each password lives inside of a gpg encrypted file whose […]
Read More… from Getting Smart With: PASS – the command line password manager
Hardening Your Home Router
Hardening Your Home Router Hardening your home router is a fairly straightforward thing to do. I will explain all the steps involved and walk you through the process. So what is hardening? It is the process of securing your network so it is harder for the bad actors to get into it. Although all routers […]
How to create Windows 10/11 boot repair disk
How to create Windows 10/11 boot repair disk It is wise to create a Windows 10/11 boot repair disk before you have problems. All hard drives fail, things get corrupted or you have other problems and without a Windows 10/11 boot repair disk you are left without a working computer. Here are the steps to […]
Read More… from How to create Windows 10/11 boot repair disk
Getting to your BIOS
Getting to Your BIOS Getting to your BIOS or UEFI firmware (the successor to BIOS) isn’t difficult, but knowing which keys to push when you are booting up can be tricky. I’ve listed a lot of different manufacturers and the keys to push when you are booting up. The BIOS is part of your motherboard […]
Alternatives to Google Search
Alternatives to Google Search Google is the three-hundred pound gorilla in the room when it comes to searching on the internet, but there are privacy concerns. Searches that you make online have the potential to reveal a lot about you and your private life. This includes, but is not limited to: your habits, your interests, […]
How to achieve online privacy
Online privacy is the goal of many of us who surf the web. Unfortunately, it is a fluid concept that is only partially achieved in most cases. Who, might you ask is storing or collecting my private data? Who is spying on me? Your local device (ie. your computer or smart phone) Your local ISP […]