BlogHide Resteemsthe-tech-guy (49)in howto • 7 years agoUse Funplug to turn an old DNS-323 NAS into an rsync serverDNS-323 as rsync backup server? Yes! My situation: I have a Synology DS216+II NAS with a lot of important data on it, and I have an old D-Link DNS-323 standing around doing nothing, because…resteemedghasemkiani (69)in security • 7 years agoDetection of a Serious Security VulnerabilityThe vulnerability is in the WPA2 protocol used to protect home and institutional wireless networks. Researchers have discovered a serious loophole in the wpa2 protocol, a common security…resteemedtomshwom (54)in security • 7 years agoTurning Hard Drives into MicrophonesIs your HDD listening to you? I stumbled on a very interesting post recently talking about a new piece of research done by Alfredo Ortega revealed at a the Ekoparty security conference in…the-tech-guy (49)in security • 7 years agosteemCreated with Sketch.How (not) to Lose Your Cryptosource How ( not ) to lose your crypto I have been reading a lot of articles here on Steemit. Even though there is a lot of good material around on the topic of how to keep your money safe…resteemedbiophil (66)in pocket • 7 years agoPocket Genesis Post: Resteem this to get your free POCKET Tokens!This is the official Genesis Post for the POCKET token. If you wish to opt-in to the Pocket protocol and claim your initial stake of 1,000,001 POCKET tokens, all you need to do is resteem…resteemedalexmejias (48)in cryptocurrency • 7 years agoHow to Create a Password that's Easy to Remember and Hard to CrackHere's a little cartoon that illustrates one of the common pitfalls we fall into when creating passwords. The good news is that it's possible to make a password that's much stronger and much…resteemedthemarkymark (78)in google • 7 years agosteemCreated with Sketch.Spyware found in Google apps with over 100 million combined downloadsView this post on Hive: Spyware found in Google apps with over 100 million combined downloadsthe-tech-guy (49)in crypto • 7 years agoWCX Tokens for free?So it seems... WCX is supposed to be a new low-cost crypto-currency comming up. If you register now, you can get 50 WCX for free . They also have a referral system: When a friend signs up…the-tech-guy (49)in steemit • 7 years agoWhat to do about plagiarism on steemit?What do I do as a user if I encounter an account of someone that is just blatantly copy-pasting from all over the internet without ever giving links to his/her sources? Flag all the posts? Flame…the-tech-guy (49)in crypto • 7 years agoHardware- vs. Software- vs Online-Wallet, a Short Introductionsource In my recent review of the hardware wallet Digital Bitbox I was asked a question that prompted me to write this pretty long answer. Since I think this could be interesting to more…the-tech-guy (49)in bitcoin • 7 years agoEver wondered what the fuss about Bitcoin vs Bitcoin Cash is about? Must read![source] Holy hell, this is crazy So I'm googling around looking for articles describing the technical differences between Bitcoin and Bitcoin Cash . Instead I find the post linked below…the-tech-guy (49)in security • 7 years agoHardware Wallet Review: Digital Bitboxsource What is a Digital Bitbox ? Like the title says, it's a hardware wallet. In contrast to your normal garden variety desktop- or mobile wallet, this little thing is completely offline…the-tech-guy (49)in life • 7 years agoBeing LovedDear diary I guess, after everything that has happened, I‘m still not used to ‘being loved‘ by someone. Usually, I don‘t care about friends. I mean, I do care about my closest friends, but not…resteemedummjackson (58)in security • 7 years agoReview: YubiKeys for U2FHi Steemers! Hope you're having a great weekend :) Following on from my latest video on two-factor authentication, the folks at Yubico were kind enough to send me out some YubiKeys to play with.…resteemeddimitrisp (68)in security • 7 years agoSecurity 101: Account Security - PAM!It is generally easier to attack a system when you already have access to an account. And the more privileges the account has, the bigger the damage you can do. A privilege escalation attack is a…the-tech-guy (49)in security • 7 years agoSigning Git Commits with GPG on WindowsEasy on Linux, hard on Windows? Well, actually not at all. I just came across this very nice post which basically explains it all. However, since I like things short and to the point, I'm…the-tech-guy (49)in security • 7 years agoHow to Configure Your Yubikey for Use with GnuPGsource Goal The goal of this procedure is to set up a Yubikey 4 with a strong master key and three derived subkeys, one for authentication, one for encryption and one for signing. Generally…resteemedtsinik (54)in security • 7 years agoHacked at home. Why is my computer infected? ~TnkSecurityWelcome back as this is another guide meant to keep you safe from online attacks. In today's lesson we will go over how to understand if a site is trustworthy, if it matters and how you can get…resteemedharshallele (58)in technology • 7 years agoNow, even hardware-based 2FA is not entirely safeA fake Yubikey next to the real one. Source: Motherboard         Two security researchers at the recent DEFCON conference have demonstrated that even hardware-based 2-factor authentication…the-tech-guy (49)in security • 7 years agoPrevent SSL certificate warning on LAN access to serverThis is going to be a short one. You know the problem of securing your NAS with an SSL certificate for some domain and then getting a warning from your browser if you want to access it directly via…