the-tech-guy(25)•in #howto•2983 days agoUse Funplug to turn an old DNS-323 NAS into an rsync serverDNS-323 as rsync backup server? Yes! My situation: I have a Synology DS216+II NAS with a lot of important data on it, and I have an old D-Link DNS-323 standing ...4the-tech-guy(25)•in howto•2983 days agoUse Funplug to turn an old DNS-323 NAS into an rsync serverDNS-323 as rsync backup server? Yes! My situation: I have a Synology DS216+II NAS with a lot of important data on it, and I have an old D-Link DNS-323 standing ...4
ghasemkiani(25)•in #security•3010 days agoDetection of a Serious Security VulnerabilityThe vulnerability is in the WPA2 protocol used to protect home and institutional wireless networks. ------------------ Researchers have discovered a serious loo...4ghasemkiani(25)•in security•3010 days agoDetection of a Serious Security VulnerabilityThe vulnerability is in the WPA2 protocol used to protect home and institutional wireless networks. ------------------ Researchers have discovered a serious loo...4
tomshwom(25)•in #security•3013 days agoTurning Hard Drives into Microphones[](https://www.bleepingcomputer.com/news/hardware/researcher-turns-hdd-into-rudimentary-microphone/) Is your HDD listening to you? --- I stumbled on a very inte...2tomshwom(25)•in security•3013 days agoTurning Hard Drives into Microphones[](https://www.bleepingcomputer.com/news/hardware/researcher-turns-hdd-into-rudimentary-microphone/) Is your HDD listening to you? --- I stumbled on a very inte...2
the-tech-guy(25)•in #security•3055 days agoHow (not) to Lose Your Cryptohttps://cointelegraph.com/images/725Ly9jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lODM4ZDZkNzNhMzNiZWEyY2Q4ZGMyZTNhOGMxMjc5OS5qcGc=.jpg source How (not...18the-tech-guy(25)•in security•3055 days agoHow (not) to Lose Your Cryptohttps://cointelegraph.com/images/725Ly9jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9lODM4ZDZkNzNhMzNiZWEyY2Q4ZGMyZTNhOGMxMjc5OS5qcGc=.jpg source How (not...18
biophil(25)•in #pocket•3060 days agoPocket Genesis Post: Resteem this to get your free POCKET Tokens!This is the official Genesis Post for the POCKET token. If you wish to opt-in to the Pocket protocol and claim your initial stake of 1,000,001 POCKET tokens, al...3809biophil(25)•in pocket•3060 days agoPocket Genesis Post: Resteem this to get your free POCKET Tokens!This is the official Genesis Post for the POCKET token. If you wish to opt-in to the Pocket protocol and claim your initial stake of 1,000,001 POCKET tokens, al...3809
alexmejias(25)•in #cryptocurrency•3062 days agoHow to Create a Password that's Easy to Remember and Hard to CrackHere's a little cartoon that illustrates one of the common pitfalls we fall into when creating passwords. The good news is that it's possible to make a password...23alexmejias(25)•in cryptocurrency•3062 days agoHow to Create a Password that's Easy to Remember and Hard to CrackHere's a little cartoon that illustrates one of the common pitfalls we fall into when creating passwords. The good news is that it's possible to make a password...23
themarkymark(25)•in #google•3065 days agoSpyware found in Google apps with over 100 million combined downloadshttp://cdn04.androidauthority.net/wp-content/uploads/2013/10/Google-Play-Article-Featured.jpg 500+ apps were found collecting data from Google Play devices usin...12themarkymark(25)•in google•3065 days agoSpyware found in Google apps with over 100 million combined downloadshttp://cdn04.androidauthority.net/wp-content/uploads/2013/10/Google-Play-Article-Featured.jpg 500+ apps were found collecting data from Google Play devices usin...12
the-tech-guy(25)•in #crypto•3068 days agoWCX Tokens for free?So it seems... WCX is supposed to be a new low-cost crypto-currency comming up. If you register now, you can get 50 WCX for free. They also have a referral syst...3the-tech-guy(25)•in crypto•3068 days agoWCX Tokens for free?So it seems... WCX is supposed to be a new low-cost crypto-currency comming up. If you register now, you can get 50 WCX for free. They also have a referral syst...3
the-tech-guy(25)•in #steemit•3068 days agoWhat to do about plagiarism on steemit?What do I do as a user if I encounter an account of someone that is just blatantly copy-pasting from all over the internet without ever giving links to his/her ...4the-tech-guy(25)•in steemit•3068 days agoWhat to do about plagiarism on steemit?What do I do as a user if I encounter an account of someone that is just blatantly copy-pasting from all over the internet without ever giving links to his/her ...4
the-tech-guy(25)•in #crypto•3068 days agoHardware- vs. Software- vs Online-Wallet, a Short Introductionhttps://image.jimcdn.com/app/cms/image/transf/none/path/sb16b2f62263859e2/image/i4c653d703c75d33f/version/1473033684/image.jpg source In my recent review of the...2the-tech-guy(25)•in crypto•3068 days agoHardware- vs. Software- vs Online-Wallet, a Short Introductionhttps://image.jimcdn.com/app/cms/image/transf/none/path/sb16b2f62263859e2/image/i4c653d703c75d33f/version/1473033684/image.jpg source In my recent review of the...2
the-tech-guy(25)•in #bitcoin•3069 days agoEver wondered what the fuss about Bitcoin vs Bitcoin Cash is about? Must read!https://themerkle.com/wp-content/uploads/2017/05/shutterstock244465780.jpg [source] Holy hell, this is crazy So I'm googling around looking for articles describ...4the-tech-guy(25)•in bitcoin•3069 days agoEver wondered what the fuss about Bitcoin vs Bitcoin Cash is about? Must read!https://themerkle.com/wp-content/uploads/2017/05/shutterstock244465780.jpg [source] Holy hell, this is crazy So I'm googling around looking for articles describ...4
the-tech-guy(25)•in #security•3070 days agoHardware Wallet Review: Digital Bitboxhttp://res.cloudinary.com/dmy29tkdq/image/upload/v1490391020/digitalbitbox/DigitalBitBoxopenboxV1.jpg source What is a Digital Bitbox ? Like the title says, it'...22the-tech-guy(25)•in security•3070 days agoHardware Wallet Review: Digital Bitboxhttp://res.cloudinary.com/dmy29tkdq/image/upload/v1490391020/digitalbitbox/DigitalBitBoxopenboxV1.jpg source What is a Digital Bitbox ? Like the title says, it'...22
the-tech-guy(25)•in #life•3071 days agoBeing Lovedhttp://az616578.vo.msecnd.net/files/2015/11/27/635841957604688445-623502608power-of-words-by-antonio-litterio-creative-commons-attribution-share-alike-3-0.jpg D...0the-tech-guy(25)•in life•3071 days agoBeing Lovedhttp://az616578.vo.msecnd.net/files/2015/11/27/635841957604688445-623502608power-of-words-by-antonio-litterio-creative-commons-attribution-share-alike-3-0.jpg D...0
ummjackson(25)•in #security•3075 days agoReview: YubiKeys for U2Fhttps://www.youtube.com/watch?v=PTJ4KdU1Ps Hi Steemers! Hope you're having a great weekend :) Following on from my latest video on two-factor authentication, th...2ummjackson(25)•in security•3075 days agoReview: YubiKeys for U2Fhttps://www.youtube.com/watch?v=PTJ4KdU1Ps Hi Steemers! Hope you're having a great weekend :) Following on from my latest video on two-factor authentication, th...2
dimitrisp(25)•in #security•3072 days agoSecurity 101: Account Security - PAM!It is generally easier to attack a system when you already have access to an account. And the more privileges the account has, the bigger the damage you can do....4dimitrisp(25)•in security•3072 days agoSecurity 101: Account Security - PAM!It is generally easier to attack a system when you already have access to an account. And the more privileges the account has, the bigger the damage you can do....4
the-tech-guy(25)•in #security•3071 days agoSigning Git Commits with GPG on WindowsEasy on Linux, hard on Windows? Well, actually not at all. I just came across this very nice post which basically explains it all. However, since I like things ...0the-tech-guy(25)•in security•3071 days agoSigning Git Commits with GPG on WindowsEasy on Linux, hard on Windows? Well, actually not at all. I just came across this very nice post which basically explains it all. However, since I like things ...0
the-tech-guy(25)•in #security•3073 days agoHow to Configure Your Yubikey for Use with GnuPGhttps://www.preining.info/blog/wp-content/uploads/2016/04/gpg-subkeys-yubi.jpg source Goal The goal of this procedure is to set up a Yubikey 4 with a strong mas...3the-tech-guy(25)•in security•3073 days agoHow to Configure Your Yubikey for Use with GnuPGhttps://www.preining.info/blog/wp-content/uploads/2016/04/gpg-subkeys-yubi.jpg source Goal The goal of this procedure is to set up a Yubikey 4 with a strong mas...3
tsinik(25)•in #security•3089 days agoHacked at home. Why is my computer infected? ~TnkSecurity Welcome back as this is another guide meant to keep you safe from online attacks. In today's lesson we will go over how to underst...4tsinik(25)•in security•3089 days agoHacked at home. Why is my computer infected? ~TnkSecurity Welcome back as this is another guide meant to keep you safe from online attacks. In today's lesson we will go over how to underst...4
harshallele(25)•in #technology•3089 days agoNow, even hardware-based 2FA is not entirely safeA fake Yubikey next to the real one. Source: Motherboard Two security researchers at the recent DEFCON conferen...2harshallele(25)•in technology•3089 days agoNow, even hardware-based 2FA is not entirely safeA fake Yubikey next to the real one. Source: Motherboard Two security researchers at the recent DEFCON conferen...2
the-tech-guy(25)•in #security•3088 days agoPrevent SSL certificate warning on LAN access to serverThis is going to be a short one. You know the problem of securing your NAS with an SSL certificate for some domain and then getting a warning from your browser ...0the-tech-guy(25)•in security•3088 days agoPrevent SSL certificate warning on LAN access to serverThis is going to be a short one. You know the problem of securing your NAS with an SSL certificate for some domain and then getting a warning from your browser ...0