Technical

How to setup a private Tor Bridge with OBFS4Proxy

The Tor Network is a powerful tool for browsing the internet anonymously and evading online censorship and web filters. Unfortunately some organizations have developed technology that makes it difficult to access the Tor Network. This tutorial explains how to create your own private Tor Bridge to bypass these restrictions. This tutorial focuses on configuring a …

How to setup a private Tor Bridge with OBFS4Proxy Read More »

Did changes in Chromium version 80 weaken cookie and password encryption?

This post elaborates on my question on the Information Security Stack Exchange and further lists information of my concern. In Chromium version 80 and up, rather than passing cookies to Windows Data Protection API (DPAPI) directly they’re encrypted with a stronger encryption algorithm and only the encryption key is protected through the API. This post …

Did changes in Chromium version 80 weaken cookie and password encryption? Read More »

Should you purchase Managed WordPress Hosting or install WordPress on your own servers?

When creating a website with WordPress, one of the decisions you’ll have to make is deciding where to host it. There are many options that you can choose from. When working on a professional website it’s usually Managed WordPress Hosting or configuring your own servers. This post goes over the pros and cons of each, …

Should you purchase Managed WordPress Hosting or install WordPress on your own servers? Read More »

How to automate your own backups with rclone and crontab on any Unix/Linux based computer

I’ve been migrating away from Google’s cloud based software. I have concerns related to the security of my data as well as want access to my documents when the Google Cloud or my internet connection is having issues. I was able to download all of my data from Google Drive easily although this creates a …

How to automate your own backups with rclone and crontab on any Unix/Linux based computer Read More »