As of Feb 2021, all major Canadian banks are going out of their way to make acquiring cryptocurrency a difficult process. If you want to purchase cryptocurrencies in Canada, this website shows likely the only way that currently works and is verified in Canada. The entire process takes less than 30 minutes. [Read more…]
The following is a short guide on how to install Splunk 8.1.x on Centos 8.
Here is the latest Apr 2020 TLD registration pricing for the AWS Route 53 in U.S. dollars.
this is just a placeholder for a query I don’t want to lose…
In this post, I discuss the process of converting an older single network interface Intel NUC mini-PC into a state-of-the-art pfSense firewall behind which I’ve placed my entire network. The whole process takes about 10 minutes and is accomplished by configuring two VLANs.
In this post, I show how to measure the bandwidth using SpeedTest.net directly from the pfSense GUI.
The following article explains the steps necessary to enable external access to pfSense GUI using a Dynamic DNS domain from DuckDNS.org. [Read more…]
In this post, I discuss the process of converting an older Intel® NUC Kit NUC5i3RYH mini-PC into a virtualized pfSense router.
A couple of time already, I had to go through the process of enabling WebDAV on Apache HTTP Server 2.4.x and even though it is a fairly simple thing to do, I always end up Googling around a proper working solution. Here are the steps… [Read more…]
I don’t mind advertising, as long as it remains unobtrusive to the end user. As a matter of fact, I am using ads on this blog. However, just recently Viber implemented the new type of video ads implemented on the Windows and Macintosh desktop Viber platform. These ads aren’t your usual standalone picture ads, these are video ads that tend to auto-play on their own along with the sound, which is especially annoying when one forgets to turn off their PC speakers. Unfortunately, Viber does not provide application settings to disable or control ads. So, here is how you can easily disable these ads on your Windows or Mac machine.
The following short article explains how to use Netsh command line scripting utility to add or delete inbound and outbound Windows firewall rules. [Read more…]
The technology is dramatically amending our workplaces. In this post, I touch on ethical dilemmas associated with electronic surveillance of employees. [Read more…]
In this article, I offer a couple of thoughts on what I believe to be the three most significant aspects of the successful research. I talk briefly about the definition of research first, then concentrate on describing the main characteristics and their importance. [Read more…]
The following article is a short visual on how to move remote desktop on Windows 10 from the default port 3389 to any other available port.
We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare. Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.