Our home office network had gradually grown to the point that no one could remember the IP addresses of all devices. All the connected PCs, phones, tablets, and other devices had to be assigned names so that, for instance, a … Read the story...
Amazon polices what customers should say and do at home
Here is a telltale sign how the big, powerful internet giants believe they can rule the world. In the US, software engineer Brandon Jackson who works for Microsoft arrived home in one evening only to discover that his Amazon Alexa … Read the story...
Modern cars have become personal data collection machines
Since 2018, when the renowned cybersecurity expert Bruce Schneier tried (and failed) to buy a new car in the US that would come without internet connection, I have worried about the personal data automakers will be collecting from our … Read the story...
Fast and easy self-hosted software for cloud file sharing
Here is an excellent open source software package for everyone who wants to self-host a simple file sharing cloud service. Perhaps you need a file sharing system for personal use, for your family or for a small team, but above … Read the story...
How I fought a copyright case against Copytrack
It was a letter from hell. When a small business or ordinary citizen gets a threatening letter from a law firm that accuses the receiver of a serious, multiyear image copyright breach, it is an experience that makes the receiver … Read the story...
How to upgrade to Debian 12, and tips for troubleshooting problems in LAMP
Debian 12 (Bookworm) was released in June 2023 for Linux computers. The new version features a massive number of updates, such as a new Linux kernel, new PHP version, LibreOffice and much more. Upgrading an operating system to a … Read the story...
How to use long and secure passwords without typing a single character
If you are not a big fan of long, unique passwords or perhaps are reluctant ever type passwords again, this is for you. I will show you a method that lets you do exactly what the cybersecurity experts have been … Read the story...
This business is driving tech industry to the era of AI
Follow the money. It is the traditional advice for everyone who wants to understand why someone is doing something that is not obvious. If I ask: why are big and small technology businesses collecting personal data of people and tracking … Read the story...
11 Key Data Protection and Safety Principles
Data protection and the safety of personal information are incredibly important topics, especially in the digital age.
As technology continues to evolve and become more integrated into our lives, our data becomes increasingly vulnerable to cybercrime, identity theft, and other … Read the story...
Has security and privacy in web browsers improved since the last year?
Security and privacy features in a number of web browsers have improved since the last time we checked a year ago. Since most browser developers claim that their browser is secure and protects your private data from tracking, the valuable … Read the story...