I won’t add new contents to this site until AI is properly regulated. I won’t go as far as removing old contents – for now. AI is now fully in the phase that Shoshana Zuboff called the disposession cycle in her “The age of surveillnace capitalism”. I’m not going to feed the AI beast.
Years ago I wrote about the Logitech’s LVUSBSta.sys driver that corrupted the USB and audio stack when installed. For a long time, I no longer bought Logitech because even if the hardware is mostly good, software was not. For a while I bought Microsoft devices, which usually worked without issues. Now Microsoft got out from […]
In the article VLANs for home networks I wrote about how VLANs and subnets can improve network security by creating different segments, usually associated with a subnet. With multiple subnets, assigning addresses in each subnet via DHCP becomes more complex. DHCP IPv4 uses broadcast packets to ask for an IP address. VLANs create separate broadcast […]
DNS for home networks
In very simple terms, a Domain Name Service (DNS), is a service that turns specific network names (host names, service names) into IP addresses. It allows to use mnemonic names (mypc.example.com) instead of IP addresses (192.168.121.234) accessing internal network resources. There are several advantages in using DNS names instead of IP addresses directly: One simple […]
QoS for home networks
QoS stands for Quality of Service and in a computer networks means a set of technologies to improve the perceived quality of network services, by modifying how network packets are managed, prioritizing the delivery of specific ones, as defined by a set of rules. Usually network packets are processed using the simple FIFO (First In, […]
VLANs for home networks
Home networks are becoming increasingly complex, and security threats as well. Once they were used mostly for personal communications, and entertainment. Now work at home, home automation, and more and more complex tasks performed online at different security levels make simple flat networks inadequate, especially form a security perspective. Does it really make sense that […]
Protecting connections with TLS requires the proper certificate/private key pairs, that need to be issued by a trusted Certificate Authority. You can buy certificates form several public CAs, or obtain free ones form entities like Let’s Encrypt. Sometimes you may need your own private CA and certificates for systems that do not need to be […]
Recent Canon cameras allow for direct uploads from the camera to different Internet services. Some of them are mediated through the image.canon gateway (i.e. Flickr, Adobe, Google), the camera uploads images to the gateway that in turn transfers them to the end service. Since those services APIs can change over time, it’s not a bad […]
All your emails are belong to MS
Microsoft is going to replace – again – the basic Windows email application. After Outlook Express and Windows mail, that despite some huge vulnerabilities were quite usable, the simple but adequate for a touch UI interface Mail in Windows 8, and the very limited and ugly Mail in Windows 10, it’s time of Outlook for […]
Vigor 165 SNMP monitoring
Monitoring network equipment is usually a good way to be notified quickly about issues that could impact operations requiring network connectivity. One way to monitor equipment is using SNMP – Simple Network Management Protocol. “Simple” is a bit an oxymoron, because the underlying settings – just look at MIBs – are far from being simple. […]