Linux
GoBlog and using MY website as the center of digital existenceI’ve relaunched my website with GoBlog
. Saying 👋🏻hello to all GoBlog users out there!
2 Minutes
Jan 15, 2025
LastMod: Jan 15, 2025
422 Words
I’ve relaunched my website with GoBlog . Saying 👋🏻hello to all GoBlog users out there!
GoBlog and using MY website as the center of digital existenceI’ve relaunched my website with GoBlog
. Saying 👋🏻hello to all GoBlog users out there!
2 Minutes
Jan 15, 2025
LastMod: Jan 15, 2025
422 Words
I’ve relaunched my website with GoBlog . Saying 👋🏻hello to all GoBlog users out there!
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
End to End Encription LiesYou might have heard of the amazing “end to end encryption” support being touted from WhatsApp after yet another GDPR privacy breach3 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
601 Words
End to End Encription LiesYou might have heard of the amazing “end to end encryption” support being touted from WhatsApp after yet another GDPR privacy breach3 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
601 Words
Self Hosted SoftwareSelf Hosting any software means freedom, flexibility and sovereignty.
The first step before self hosting software is to own your own slice of the internet with a static website
.
Reclaiming the independent web starts with self hosting your own site!
The natural next step is is to self-host software on your own LINUX virtual private server (beginner tutorial)
.
You can in theory use static hosting
and still self host for the fun of the community.
5 Minutes
Dec 23, 2024
LastMod: Dec 23, 2024
980 Words
Self Hosting any software means freedom, flexibility and sovereignty.
The first step before self hosting software is to own your own slice of the internet with a static website . Reclaiming the independent web starts with self hosting your own site! The natural next step is is to self-host software on your own LINUX virtual private server (beginner tutorial) . You can in theory use static hosting and still self host for the fun of the community.
Self Hosted SoftwareSelf Hosting any software means freedom, flexibility and sovereignty.
The first step before self hosting software is to own your own slice of the internet with a static website
.
Reclaiming the independent web starts with self hosting your own site!
The natural next step is is to self-host software on your own LINUX virtual private server (beginner tutorial)
.
You can in theory use static hosting
and still self host for the fun of the community.
5 Minutes
Dec 23, 2024
LastMod: Dec 23, 2024
980 Words
Self Hosting any software means freedom, flexibility and sovereignty.
The first step before self hosting software is to own your own slice of the internet with a static website . Reclaiming the independent web starts with self hosting your own site! The natural next step is is to self-host software on your own LINUX virtual private server (beginner tutorial) . You can in theory use static hosting and still self host for the fun of the community.