Skip to content
  • Blog and News
  • What we do
  • Books
  • Contact
  • About
  • Suomeksi

Andalys

Articles, Ebook Production, Web sites

Andalys logo

Category: Communications

mastodon migration screen shot
Posted in Communications, Media, Technology

How to migrate to another Mastodon server

Posted on 2023-01-112023-01-03 by Sam JJ

So I decided to move to a new Mastodon server (also known as an instance) that had terms better suitable for one of our foreign language blogs. It is really amazing that a migration function even exists in a social … Read the story...

nextcloud welcome window
Posted in Communications

Nextcloud self-hosters appreciate privacy and apps

Posted on 2022-01-092022-01-09 by Sam JJ

Nextcloud is an open source software package for self-hosting cloud services, such as file and photo sharing, office applications, calendar, note taking, project planning, bookmarks, and news. At the end of 2021, a survey among Nextcloud users provided valuable insight … Read the story...

spam folder in an email system
Posted in Communications, Technology

How to filter messages hosted by any email server

Posted on 2021-07-112021-09-21 by Ari

Some time ago, I caught our email hosting company reading my inbox. I access email in a web browser, and the browser status line displayed that a script was continuously polling for new messages and relaying data to another organization. … Read the story...

exim4 mail server configuration tool
Posted in Communications, Technology

How to configure a send-only email server on Linux

Posted on 2020-12-102021-11-07 by Ari

Update 2021-11-07: I have written a new section that shows you how to configure exim4 if the direct SMTP send method is rejected by email providers.

Many server software applications, like WordPress and Nextcloud can send alerts and notifications to … Read the story...

Copenhagen, Denmark. cyclist has stopped to send a text message on his phone.
Posted in Communications, Technology

Which phone doesn’t track me?

Posted on 2020-09-252020-09-25 by Ari

Is it possible to find a secure and privacy respecting mobile phone that doesn’t track its owner? The short answer to the question is: no, there is no such phone. Nonetheless, I believe it is valuable to understand why because … Read the story...

radio mast for mobile network and other signals
Posted in Communications, Technology

This is why your mobile phone is constantly being tracked

Posted on 2020-06-04 by Ari

Mobile phone is one the most useful innovations of modern times. It is a remarkably valuable technology that has transformed our lives, work, and to certain extent communities all over the world. Our culture has changed as communication between people … Read the story...

rainloop webmail update version
Posted in Communications, Technology

How to install Rainloop webmail for accessing multiple inboxes in a browser

Posted on 2020-03-262020-03-26 by Sommet

My problem with email used to be that I had to manage multiple email accounts because of multiple job roles I had. Since I only use webmail for getting access to all my inboxes and outboxes from any device, I … Read the story...

skype, no connection, echo service, screen shot
Posted in Communications

Goodbye Skype! I’ll miss you, but I’m getting another Voip service for privacy

Posted on 2020-01-162020-01-15 by Ari

Microsoft, the current owner of Skype internet telephone service, was recently caught listening to ordinary people’s phone conversations conducted on Skype.

The first case was reported in August 2019 when Microsoft utilized Skype’s automatic translation feature to listen to phone … Read the story...

upgrade nextcloud 17 wizard
Posted in Communications, Technology

Upgrade to Nextcloud version 17

Posted on 2019-10-262019-10-25 by Ari

Open source cloud server Nextcloud development team has released version 17 of the software. We decided to upgrade our Nextcloud 16 system to version 17, and document the required steps while doing it. Here is a guide you can follow … Read the story...

Posted in Communications

Dell XPS 13 twoone review: Lots to flex, few weaknesses

Posted on 2019-10-082019-10-11 by Lucento

From: Ars Technica

Dell XPS 13 two-in-one review: Lots to flex, few weaknesses

Enlarge (credit: Valentina Palladino)

If the changes brought to the Dell XPS 13 earlier this year intrigued you, you may be even more excited for the XPS 13 two-in-one. Dell updated its flagship convertible even more than

… Read the story...

Posts navigation

Older posts

Recent Posts

  • Modern cars have become personal data collection machines
  • Fast and easy self-hosted software for cloud file sharing
  • How I fought a copyright case against Copytrack
  • How to upgrade to Debian 12, and tips for troubleshooting problems in LAMP
  • How to use long and secure passwords without typing a single character

Follow us:

Social meda feed
Newsfeed (RSS/XML)
  • Blog and News
  • What we do
  • Books
  • Contact
  • About
  • Suomeksi

Advertisements

Ebook downloads for travelers

download travel guide to Valencia, Spain

Technology Newsfeed

Sat, 30 Sep 2023 15:22:58 +0000

#Google #Chrome's #Privacy Sandbox is neither private – preventing one from being observed – nor a sandbox – an environment in which code can be executed in isolation. Rather it's a suite of advertising, analytics, anti-spam, and anti-tracking technologies. The goal for some of these is to replace third-party cookies. #adtech
Read the story

Sat, 30 Sep 2023 06:14:27 +0000

Should we be worried about the data our vehicles are constantly transmitting to manufacturers, and in some cases to other organizations? Mozilla’s Privacy Not Included research ranked #cars as the worst product category they have ever reviewed for privacy. Yes, we should be concerned about our #privacy and what cybercriminals can do with our sensitive data when they manage hack into databases that store the data. #security
Read the story

Fri, 29 Sep 2023 06:53:03 +0000

New #email #phishing method: By using zero font, #hackers can type in text that will show up in the email list, but not in the email itself. In this instance, they used “Scanned and secured by Isc®Advanced Threat protection (APT),” trying to make the recipient think the email message was scanned by an endpoint security solution and was deemed clean.
Read the story

Thu, 28 Sep 2023 10:56:24 +0000

Hackers are taking over large amounts of social media accounts. Users whose #Facebook or #Instagram accounts have been compromised can’t access them. They often lose years worth of posts and photos, and if they’ve connected their account to any payment methods, they could lose money too. And sometimes, it’s not entirely clear how #Meta, Facebook’s parent company, could put a stop to this.
Read the story

Wed, 27 Sep 2023 06:22:01 +0000

#EU to Tim Cook: "The next job for #Apple and other Big Tech, under the #DMA is to open up its gates to competitors," he said. "Be it the electronic wallet, browsers or app stores, consumers using an Apple iPhone should be able to benefit from competitive services by a range of providers. #bigtech
Read the story

Tue, 26 Sep 2023 06:19:27 +0000

#Tiktok video channel #Booktok becoming more popular than #Booktube: The fact that a Chinese company owns one of the most important platforms for young people’s free expression in the West—and a critical route for recommendations of #books, paginated symbols of free thinking—is a plot twist fit for fiction.
Read the story

Mon, 25 Sep 2023 12:30:41 +0000

Thank you! #map
Read the story

Sun, 24 Sep 2023 06:47:01 +0000

Recently, method to steal #Airbnb accounts discovered ( Read the story ) In a recent report, researchers at Akamai revealed that the #Booking.com attack goes beyond compromising the hotel or booking service and extends to targeting the customers themselves. By using a direct and trusted communication channel, the cybercriminals send phishing messages disguised as legitimate requests from the compromised entity. #security
cybersec84.wordpress.com/2023/

Categories

Tags

Android app Apple browser cloud CMS cyber debian ebook email Facebook Google guide hacker install linux macOS Microsoft mobile network nextcloud online open source operating system phone plugin privacy report research review security server service social media software study survey tablet tracking Twitter upgrade web site Windows Wordpress writing

Archives

Privacy notice: this web site uses cookies to personalise ads, to provide social media features and to enable collection of traffic statistics. Information about your use of this site is shared with social media, advertising and analytics partners.

Blog and News | What we do | Books | Contact | About | Terms of Use | Privacy Policy | Cookie Policy | Impressum | Advertise | Suomeksi
Copyright Andalys 2023
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. In Settings, you can choose which cookies are saved. By clicking Accept, you save your Settings and consent to our cookie policy.
Do not sell my personal information.
SettingsACCEPT
Manage consent
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT