Manage Docker with Portainer
In the previous post I went over how to install Docker and run a Pi-hole and Unbound stack. A much easier way to manage docker than using the CLI commands is to install a Portainer Docker container. And it couldn’t…
In the previous post I went over how to install Docker and run a Pi-hole and Unbound stack. A much easier way to manage docker than using the CLI commands is to install a Portainer Docker container. And it couldn’t…
Pi-hole has to be one of the best things you could run on your home network to protect your privacy and enable advertisement, tracking, and malware site blocking for all the devices on the local network. This is especially helpful…
We’ve covered Tor Browser, but what can you do to protect yourself in your regular web browser. My favorite browser plugin tools are uMatrix and uBlock Origin. Now a warning, this will require some initial configuration on new sites that…
Before you discount using Tor as the western media propaganda would make you think it’s for hackers and the dark web, Tor was actually created by the U.S. Naval Research Lab for their agents, press, people fighting for human rights,…
A great way to protect yourself and your Windows Machine from malware is to do your internet surfing from a virtual machine. Some malware will recognize that it’s in a virtual machine and shut down, as many malware researchers use…
Here is a great review of an FTC report and the Full FTC report: The author recommends using a VPN which you have to consider carefully as that can be another angle of tracking with less stringent legal…