Instagram is Top Privacy Invasive App

Privacy is a concept long sacrificed on the altar of convenience. More legislative attention improves temporarily the situation, until the large conglomerates learn their way around it. We look at a recent analysis made by pCloud.  Read more »

Pre-Diabetes and Dietary Advice for Weight Loss

Given a recent study on weight gain during the pandemic, we look at conventional wisdom advice on dealing with weight gain and the omnipresent menace of diabetes. Read more »

gaming laptop upgrade I: cloning SDD drive to 1TB NVME

I purchased my gaming laptop (.ca) in a hurry, at a time when many others were buying theirs, and was unable to get all that I wanted. Compromises had to be made. But this past December, I took the plunge and upgraded the memory and the hard drive (which was already quite fast, but a little too small). Read more »

Rediscovering Tmux and Screen

I have recently resurrected some older devices with flaky connectivity and while ssh-ing into them had to use some terminal tricks (aka multiplexers) to restore connections if disconnected (or to purposely disconnect/reconnect on long commands). I used tmux where possible, but occasionally only GNU screen was available, making a summary of features opportune. Read more »

Block Ads and Get Youtube Premium Free!

Youtube is a wonderful platform and its creators deserve to be able to make a living. Many of them actually do by serving Google ads (with Google keeping a significant portion of ad revenue) or, via some Youtube subscription model that was first called Red and now is Premium (this may be inaccurate, I’m not following it closely). If, like me, you dislike a model where Google decides who is worthy of support and who’s not and gets to keep the lion’s share of ad revenue, this article might be for you. If, on the other hand, you have the means to purchase YouTube Premium and don’t have time to waste, go ahead and get it, it’s definitely worth it! Read more »

crunch dictionary wordlist for WPA handshake cracking

Despite the numerous vulnerabilities and cracking methods around WPA and its successor, a black hat might find themselves brute-forcing a handshake. If the most common list of passwords fails, (a dictionary attack that automated tools generally employ) the next to try is a list of valid phone numbers in that particular area, which can be easily generated. Read more »

Metasploit on Windows and Android

I recently went to the trouble of installing Metasploit Framework (MSF) on a few devices (Android smartphone, Windows laptop, Kali on multiboot), with various degrees of success. My experiences may be helpful for others attempting the same, as well as for me, so that I can finish it later. Read more »

Smarten up your Android smartphone I: SSH, SSHD

There seems to be a mistaken belief that in order to gain superuser access (or to do serious development or, to use a popular misnomer, “hacking”, one has to “jailbreak”, or as it is called everywhere other than iOS, “root”. Let us see how anyone can do most of it using an excellent and completely free hack (or app) called Termux. Read more »

Your gift enables us to continue to provide high quality reporting with little or no advertising.