Information Technology
AWS Route 53 – Domain Registration Pricing (Apr 2020)
Here is the latest Apr 2020 TLD registration pricing for the AWS Route 53 in U.S. dollars.
How to buy Dogecoin (DOGE) and other cryptocurrencies in Canada (in minutes)
As of Feb 2021, all major Canadian banks are going out of their way to make acquiring cryptocurrency a difficult process. If you want to purchase cryptocurrencies in Canada, this website shows likely the only way that currently works and is verified in Canada. The entire process takes less than 30 minutes. [Read more…]
Converting single NIC mini-pc into pfSense router/firewall by using virtual LAN configuration on a managed switch
In this post, I discuss the process of converting an older single network interface Intel NUC mini-PC into a state-of-the-art pfSense firewall behind which I’ve placed my entire network. The whole process takes about 10 minutes and is accomplished by configuring two VLANs.
How to run speedtest.net directly from the pfSense GUI
In this post, I show how to measure the bandwidth using SpeedTest.net directly from the pfSense GUI.
Updated Sept 27, 2021 to reflect py37-speedtest-cli package change.
How to implement remote management in pfSense 2.4.4 by using a DuckDNS Dynamic DNS domain
The following article explains the steps necessary to enable external access to pfSense GUI using a Dynamic DNS domain from DuckDNS.org. [Read more…]
Converting Intel NUC Mini-PC into into a virtualized pfSense router
In this post, I discuss the process of converting an older Intel® NUC Kit NUC5i3RYH mini-PC into a virtualized pfSense router.
How to enable WebDAV on Apache HTTP Server 2.4.x
A couple of time already, I had to go through the process of enabling WebDAV on Apache HTTP Server 2.4.x and even though it is a fairly simple thing to do, I always end up Googling around a proper working solution. Here are the steps… [Read more…]
How to Disable Viber Annoying Ads on Windows and Macintosh
I don’t mind advertising, as long as it remains unobtrusive to the end user. As a matter of fact, I am using ads on this blog. However, just recently Viber implemented the new type of video ads implemented on the Windows and Macintosh desktop Viber platform. These ads aren’t your usual standalone picture ads, these are video ads that tend to auto-play on their own along with the sound, which is especially annoying when one forgets to turn off their PC speakers. Unfortunately, Viber does not provide application settings to disable or control ads. So, here is how you can easily disable these ads on your Windows or Mac machine.
Controlling inbound and outbound Windows firewall rules from the command line
The following short article explains how to use Netsh command line scripting utility to add or delete inbound and outbound Windows firewall rules. [Read more…]
Electronic Monitoring in Workplace and Ethical Dilemmas of Corporate Policy Documents
The technology is dramatically amending our workplaces. In this post, I touch on ethical dilemmas associated with electronic surveillance of employees. [Read more…]
Successful research and its three most important characteristics
In this article, I offer a couple of thoughts on what I believe to be the three most significant aspects of the successful research. I talk briefly about the definition of research first, then concentrate on describing the main characteristics and their importance. [Read more…]
How to move RDP to a different port on Windows 10
The following article is a short visual on how to move remote desktop on Windows 10 from the default port 3389 to any other available port.
Ascent of Information warfare (IW) in Cyberspace
We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare. Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.