How IPFire protects your Family on the Internet
Caregivers need Help If you are a caregiver for others then we know first-hand that you need help. The children or senior citizens in your life are a huge challenge…
Caregivers need Help If you are a caregiver for others then we know first-hand that you need help. The children or senior citizens in your life are a huge challenge…
I decided to take my own advice and deploy Pi-Hole on Amazon LightSail. I made a couple of changes to the deployment that make it easier and more efficient. The…
Upgrading Slackware Recently I made the innocent mistake of updating Slackware (to include Kernel updates) without making any allowances for LILO and the X-Window startup process. That is the third…
What is a Decentralized VPN? Decentralized VPNs promise to be the upgrade to existing, standard VPN services. They claim to offer better privacy at lower prices than their traditional counterparts,…
Data copied from devices at entry points into the United States — including airports and border crossings — gets saved for 15 years in a database searchable by thousands of…
What is a Custom Firewall? "Flash Routers" are another term for a custom firewall and WiFi Access Point. They are a form of custom firewall and WiFi access point that…
Relying on open source doesn’t mean you are opening your organization up to vulnerabilities, as long as you review the code for any security concerns. Unlike proprietary software, open source…
Slackware 15 RC2 was released not long after we posted a quick review and installation how-to for RC1. In our experience with the installation process nothing has changed since RC1…
One great thing about Linux and the open source community is that as soon as a vulnerability is detected, developers are hard at work releasing tools to mitigate the problem.…
This week has led to yet another major vulnerability being discovered in major corporate software stacks, leading to a massive effort to discover, patch, and update. I remember the first…