(10-01-23) Blog 10 – Enhancing the Pi-hole
Welcome back! If you've been keeping up with these blogs, by now you should be…
(09-01-23) Blog 9 – Changing your view
If you've been keeping up with this mini-series of pi-hole blogs and building your pi-hole…
(08-01-23) Blog 8 – analysing your data
If you've been following this series of posts, hopefully by now you have a pi-hole…
(07-01-23) Blog 7 – customising your pi-hole
In this installment, I'll run through some of the ways which you can customise your…
(06-01-23) Blog 6 – Blocking those pesky ads
By now you should have your pi-hole up and running with devices using it for…
(05-01-23) Blog 5 – Pi-hole, post install activities
This is the 2nd in my mini series on the wonderful thing that is a…
(04-01-23) Blog 4 – Blocking ads and more with a Pi-hole
For blog number 4, I thought I'd turn my attention to something I believe is…
(03-01-23) Blog 3 – Stealing cars the cyber way
Modern cars are brilliant. Fuel efficient, comfy, smooth-riding, fast, and often packed to the hilt…
(02-01-23) Blog 2 – Passwords
Sometimes called a passcode or a passphrase, passwords are supposed to be secret data typically…