Anything technological (soft or hardware). This includes all topics open source: Apache web-serving, Drupal, Ubuntu.

Tor, what is it good for?

Tor! (homepage)


What is it good for?


A whistleblower, journalist, or blogger in a hostile environment, a hostage or victim of human trafficking; those dominated, vulnerable, marginalized, propagandized, and all those generally in need of a way to speak out or seek out, to cry out maybe for the sake of their very lives... all of these folks need the same critical thing: a voice. They all need a way to have a voice that is safe, secure and discrete, trusted and confidential. They need a way to reach out and speak out that leaves no trace, and reveals no characteristic.

On the internet everything that you do is ticked and tucked away, targeted for tracking and ongoing identification for the surface purpose of such benign ideals as targeted advertisement in the name of robust and free trade practices. However these tracking practices, together with the digital footprints that we leave behind, can be used for nefarious purposes as well. Hostile governments can hack, track, silence and censor their citizenry, cyber-criminals may track and then hack your identity and resources; vital information such as science or current events may be kept from you, keeping you a prisoner of ignorance and propaganda; or maybe you just get yourself and all of your friends and families targeted by aggressive spammers.

It is easy to see that there are many ways that we need discretion in our online lives. We need a cryptographic security to protect our freedoms and privileges of free speech, open research, access to research, free exchange of information, and choice. Meet Tor A nice shallot... The onion router, which provides a one stop solution for all of those needs. Tor liberates online communication, for good or ill, and equips us to lead a more confident and, for all of Tor's discretion, open online lives. A champion against censorship and overbearing authority, Tor is a champion of free speech.

This post explores what Tor is, takes a brief look at how it works, and explains how to get connected to it.

Content Tag: 


Passwords no more: Client Side SSL authentication the easy way


Passwords, difficult to remember, difficult to remember to change, so much so that companies like Google, Mozilla, and Last Pass are always devising ways to help us keep track of them. Always subject to being hacked due to password weakness, insecure connections, or data breaches, they represent as much a security failure as they do a safeguard system. 

Fortunately, we have ssomething available to put in place to bolster up our data security: SSL, or more specifically Client Side SSL. This system involves installing a trusted, secure certificate on the client computer that is used to authenticate a user. A much better alternative than a simple password, and much more transparent of a user experience in the end.

Setting up client side SSL is a lot easier than it might seem at first glance, and provides a great way to authenticate our users' identities. Passwords no more...


Let's Encrypt The Web: Safeguarding internet privacy with free, trusted SSL



It's not uncommon for modern computer users to run a home server, or for hobbyists or enthusiasts to purchase an affordable VPS and run apps for a Personal Cloud. With great apps like the Ampache media server, and platforms like Own Cloud, this is easier than ever, and an ever more attractive an option. If this is you, or if you run a blog, a small bushiness or non-profit website where you collect sensitive information, you might want to consider encrypting and securing that traffic from prying eyes, especially if any personal or sensitive data is within it. 

The way to do this is through the use of globally trusted and signed certificates, commonly referred to as SSL. You know when a site is using this technology if the beginning of the URL starts with a nice, green "https" instead of just "http". These trusted certificates are often very expensive, and the most of us have limited funds to address this costly and critical issue. This is where Let's Encrypt comes into the picture. Their mission is to provide quality, free certificates to anybody that wants them. They envision a web that is 100% encrypted, and appear to be well on their way. 

This post will show you how to obtain and configure your own free certificates from Let's Encrypt to ensure trusted and secure experience for your users.


Ubuntu Dreams of Electric Sheep...

About 4 years ago Ubuntu, a very popular Linux desktop operating system, decided to strike the beautiful Electric Sheep screen saver program from it's repositories (think app store). For those of us that love using screensavers as a way to bring a little artwork to our office or media server, this was a harsh blow, as the Electric Sheep program was elegant and beautiful, and there was no simple path to bringing it back. Now, thanks to the ever vibrant open source community, there is finally a simple solution to bring life back to our sleeping screens...

Content Tag: 


Damn the internet blockades! Run your own Private Proxy server with Seamless Authentication


Paying attention to the news, and to certain types of legislation that are constantly being passed around, it becomes more and more obvious that we people might want to secure our internet usage form prying eyes, or find ways to keep access to the sites that we have come to rely on. I am a big proponent of the principle of freedom of information, privacy, and security, or of just people keeping their nose out of other people's business, especially mine. Fortunately, despite the looming climate of Orwellian anti-privacy and anti-free-information measures that are constantly being tossed about, there are things that we can do to secure our privacy and therefore peace of mind.

Over the last few weeks I posted some simple instructions on how to secure your internet traffic, and how to add a layer of security to your home server (every household should have a home server). This post is going to add to our security knowledge base and show how to set up a simple, anonymizing, caching, http/htttps (web) proxy server, with seamless authentication, meaning no need to log in. This server will be able to get around internet blockades, and will not be open to the public, but you won't ever have to enter in your user name or password. Again, I am opting for the added security of running my own proxy, instead of subscribing to a service, because I can set the security, manage the data retention (or lack of retention), and I just get free of having to pass my data through anyone else's hands.

So, check out how to install your own personal web Proxy, which can also be used to filter out ads or pesky "bad" web sites.

Content Tag: 


Fancy 403: Ban them All!

Lot's of tech savvy computer users these days have figured out how to set up a home server to act as a file server, a streaming media server, a legitimate web-site server, a proxy server, and any number of other case sues. Surely, having access to your home computer, akin to your own personal "cloud", while away from home is not only a luxury, but in the professional or academic world, this can be a ral life saver.

But, along side that convenience, the problem of security arises when we connect our home computers to the internet and register a domain to our dynamic IP address. Suddenly, there are potential prying eyes that we may not want paying attention to us. There are, of course, several ways to mitigate this problem, here is one more...

Content Tag: 


SOCKS5 Proxy in Ubuntu 14.04: mystery no more!

Secure Your Internet Traffic on Ubuntu 14.04 with a SOCKS proxy

(it's easier than you think!)



In this day and age, we use our computers for everything from banking and bills to searching for love, trolling our friends on social media sites, and even telling our deepest secrets to our most trusted allies. We trust our computers to handle all our most sensitive information, and so it is more important than ever that we do everything that we can to ensure the safety and security of our information and our connections. 

This step-by-step instructional will show you how to easily set up a SOCKS4 or SOCKS5 proxy server, which will harden your internet connection and provide you with the peace of mind in knowing that your identity, finances, and private life, are all that much more safe and secure.  

Just follow along, I did the homework so that you don't have to.

Content Tag: 


Tricking out Rhythmbox... or "How to share even more trivial minutia of your life with the world"

I have written before about some cool things you can do with Rhythmbox Music Player in linux, and it's no secret that I love to find ways to make my desktop experience merge with my server/online presence. So I was particularly happy when I found a great third party plugin for Rhythmbox that can post the now playing info to just about anywhere you want it to.

Ever wanted to trick out a forum signature, or a profile on a website you frequent? Or are you (like me) just looking for neat ways to make your personal website a bit more snazzy? In walks the rhythmtoweb plugin and this "need" is filled. Fret not, it's pretty straightforward to set up.

Content Tag: 


How to clean up your Music library mess...aka: I just joined "Play Ogg"!

What do you do when your entire music library is infested with wma files, incorrectly tagged and renamed, sorted all wrong and just one big mess? You admit it was your own fault for not sticking to one single standard for naming and organizing, for letting Windows Media Player try to do the work for you, and not trying first to understand formats and codecs and licenses. Then you get rid of your wma files (DELETED) and re-rip, re-download, re-tag and re-encode until your entire library is ogg, uniformly named, sorted and tagged correctly. This is the 17000 file mess I am cleaning up right now, and I decided I should join the PlayOgg movement for some inner support. Henceforth, I will be displaying this or similar on my site. Ogg is a great multimedia format that is simply the one solution that will work for everything I need as a format, and as a piece of nicely licensed and supported free and open source goodness. It's widespread implementation would be just an awesome thing. The only reason I have not moved on this yet, is the knowledge that doing so would force me to do so much tedious work on my music library...well, I'm over it (Trying hard not to slam wma to compare it to ogg) and I am now taking the correct steps. Read below the break for some useful tips to get the job done.

Content Tag: 



Subscribe to RSS - tech