Recently I moved over to Virgin Media for Internet access, since I had reached the maximum speeds the old copper cabling from BT could offer me. Virgin, being built on the more modern Nynex network built in the south of England during the early 90’s allowed for much greater speeds. There’s just a couple of irregular checks I have to perform when it comes to switching ISP:
There’s never been a better time to catch up on all those household projects you’ve been putting off over the last X years. With lockdown firmly upon us in the UK, I decided to complete a project that’s been in the back of my mind ever since we subscribed to our third streaming service.
I’ve always been a fan of both Windows and Linux. Each have incredible strengths and weaknesses, and although enough time and effort could be spent consolidating on one platform – It would be very hard for any IT engineer today to not know the other.
This article originally started off as a “Why the hell can’t I enable Mount on Boot!?” query, but after solving that mystery, I decided to dig a little deeper into the operation of Synology NAS encryption. Hopefully this will help you make sense of a somewhat complex issue, especially if you’re not too familiar with encryption in general.
As we roll on towards the year 2020, into a new decade of opportunity, excitement and hopefully reward, it seems like a good time to review your security and privacy practices within your digital life. After all, practicing good security is a process, requiring constant improvement.
Saturday 6th July saw The Debian Project release version 10 of the Debian OS, codenamed “Buster”. I’ve long been a Debian fan, initially seduced by the vision of truly free software (not in the “free pie” sense!), and then over time, it’s simplistic approach to design and the fact it has grandfathered distro’s such as Ubuntu, Linux Mint and Kali.
Back when I was a network administrator, mobile phones were only just starting to spread throughout the corporate world. Blackberry ruled the industry with their Blackberry Enterprise Suite, and the privileged few employees were issued with phones. For the most part however, mobile devices remained very much personal and with minimal access to corporate resources.
The subject of gaining backdoor access to your private life isn’t a new one. In fact, before modern technology, authorities and organised criminals sought ways to listen in to places they shouldn’t – so what’s up with the latest attempt at gaining a peak into your private communications?
It’s no coincidence I stopped updating The Serpent right around the time my first child was born, that was a wild few years! Fortunately, a long weekend appeared over the horizon and allowed me time to sit down and catch up on some things. One of them being The Serpent.
There’s a lot of talk in the UK about the new “Snoopers Charter” that’s threatening to destroy the very fabric of the Internet (again). As I get older, I find myself worrying less and less about things like this, for two reasons: