Category Archives: Computer Security

News News News…

Really there isn’t a whole lot of news to put here.  Not a huge amount of stuff has really been going on here, or much with the whole overall business, but let’s look at what might be going on. LedgerSMB Matrix Synapse publicly installed Vector er Riot privately installed Note, not sure about a public […]

Also posted in Business News, Internet Security, Network Security, Site News | Tagged , , , , , , , , , , , , , , | Leave a comment

New Topics?

Thinking of some new topics.  I will post a new “new topics” page each time I come up with some new ideas of what to write about: Previously considered topics: Adobe CS4 on El Capitan (still need to figure this out) Technical perspective on Activism stuff Sound working on new computer (got it working rather […]

Also posted in Business News, Computer Support, Internet Security, Network Security, OS X (Mac), Site News | Tagged , , , , , , | 1 Response

Setting up SUDO Gentoo

I had not been using SUDO on my testing server until just a little while ago (like less than a few hours).  I realized that this is a problem which I should fix, so I did.  Well mostly… Installing SUDO After trying to see what I had to do to get SUDO working correctly, I […]

Also posted in Computer Support | 1 Response

Securing Server (Part 1 of ?)

There was a recent link posted to YCombinator Hacker News titled “My First 10 Minutes on a Server” (Link to article, link post is here).  With seeing that it reminded me that I have meant to start working on securing the web test server (which is currently not web accessible). There are some things  mentioned […]

Also posted in Computer Support, Network Security, Site News | Tagged , , , , , , , , , , | Leave a comment

The Onion Router (TOR)

I was asked about whether someone should be using The Onion Router (TOR) and I thought I would answer this as best I can here.  So let’s look at the 5Ws+H that I might ask about TOR. What? What is TOR?  Who? Who created TOR? Who is running TOR? Who needs to use TOR? Do […]

Also posted in Computer Support, Network Security, Research | Tagged , , , , , | Leave a comment