In this installment, I’ll run through some of the ways which you can customise your pi-hole to suit your different user needs. In the previous post, I covered how to add domains to your block li...
DNS, or the Domain Name System, is the system that translates human-readable website names (such as cybertrainer.uk) into the numerical IP addresses that computers on the Internet use to communicate w...
By now you should have your pi-hole up and running with devices using it for DNS checking. At the moment, the pi-hole will be using the default block list from it’s gravity database, which for m...
This is the 2nd in my mini series on the wonderful thing that is a pi-hole. If you are fortunate enough to have a raspberry pi, you might now have completed the installation of the pi-hole software. I...
For blog number 4, I thought I’d turn my attention to something I believe is a must-have in every home network – A Pi-hole I’ll get on to exactly what a Pi-hole is and why you should...
Modern cars are brilliant. Fuel efficient, comfy, smooth-riding, fast, and often packed to the hilt with gadgets and gizmos, all designed to make our lives easier. BUT…. They often come with lit...
Sometimes called a passcode or a passphrase, passwords are supposed to be secret data typically used in association with an identity value (username, email address, etc.) to help secure a system such ...
Full disclosure – I wrote this whilst reading the book “Sandworm” by Andy Greenberg (amazon link) and I decided to build a short PowerPoint about the events leading up-to, during, an...