Posted in IT Security

Deauth Detector, the new must have.

Despite being a security-orientated government agency, a company I’ve been working for recently provided me with a WiFi Only laptop….

Price versus Value
Posted in Employment

Companies: Should they offer you less you asked for?

One of the first things that Recruitment Agents ask is what remuneration I am looking for. They take that away,…

Posted in Uncategorized

Online Tools for Techies

DNS Tools DNS Configuration Check The Defacto DNS configuration check and guidelines.   IP Addresses Determine your…

Posted in Uncategorized

Human attributes that cannot be replaced, yet, by AI

With AI being adopted a little too fast, it’s probably going to be a good idea to leverage skills that…

Posted in Uncategorized

Synology Memory Upgrades

If you’re unaware, I like Synology NAS drives. I use them for Docker and VMM projects due to their efficiency,…

Posted in Learning

Free Training from the Open University

If you have a Kindle, iPad, iPhone, Mac or PC, then you can access the Kindle App or Kindle Reader…

Posted in Containerisation Docker Synology

Pi-Hole on Synology

If you want to install pihole into Docker on your Synology NAS, I recommend going down the macvlan route so…

Posted in Employment

Remote working

I wonder whether the remote working phenomenon started by Covid 19 is the solution we all wanted. I worked for…

Posted in Synology

Using TimeShift with Synology NAS

TimeShift is a “Linux Equivalent” to Apple TimeMachine, but it uses hard links and rsync to perform its task. This…

Posted in Employment

Listening to Feedback

Feedback is critical if you want to improve. But how should you handle feedback? Unsolicited or otherwise. If your values…