(06-01-23) Blog 6 – Blocking those pesky ads
By now you should have your pi-hole up and running with devices using it for…
(05-01-23) Blog 5 – Pi-hole, post install activities
This is the 2nd in my mini series on the wonderful thing that is a…
(04-01-23) Blog 4 – Blocking ads and more with a Pi-hole
For blog number 4, I thought I'd turn my attention to something I believe is…
(03-01-23) Blog 3 – Stealing cars the cyber way
Modern cars are brilliant. Fuel efficient, comfy, smooth-riding, fast, and often packed to the hilt…
(02-01-23) Blog 2 – Passwords
Sometimes called a passcode or a passphrase, passwords are supposed to be secret data typically…
(01-01-23) Blog 1 – NotPetya
Full disclosure - I wrote this whilst reading the book "Sandworm" by Andy Greenberg (amazon…