The backup process is probably one if not the most fundamental aspect of personal IT or personal information security – at the same time one of the most neglected aspects for both techs and non-techs. Continue reading “The all required backup process”
Given the wealth of useful and not-so-useful content we find on the internet, it comes down to selection and filtering to find out exactly what you are interested in, preferably, in the fastest/convenient way possible.
The below setup is what I use for PCs that need basic minimal protection against malware, without any, or with as less as possible, user intervention.
The software mentioned are recommended out of personal experience and based on what worked for myself, my users and my use cases. No affiliate/promo bs involved. Continue reading “Windows User Endpoint Security – basic, easy and free”
Timestamps – February 2017 to March 9-3-2017 + older ones on the same pattern from May 2016
Timestamps – across February 2017 and the latest on 1/3/2017 11:05 PM
Timestamps – end of January 2017 – 26/1/2017 12:06 PM
Another email scam. This time, a bit insistent, as I’ve been getting 6 similar emails in 2 days already, that are informing me that I’ve received a new fax. Continue reading “Email scams – you have received a new fax”
I kept finding strange things in my log files and I wanted an automated way of going through them and banning IPs that are trying weird stuff. The answer in this case was fail2ban and the example that I’m covering in this post is looking out for and banning IPs attempting to use my mail server as an open relay. Continue reading “Getting the hang of fail2ban”