Posts

Instagram is Top Privacy Invasive App

Image
Privacy is a concept long sacrificed on the altar of convenience. More legislative attention improves temporarily the situation, until the large conglomerates learn their way around it. We look at a recent analysis made by pCloud.  

Pre-Diabetes and Dietary Advice for Weight Loss

Image
Given a recent study on weight gain during the pandemic, we look at conventional wisdom advice on dealing with weight gain and the omnipresent menace of diabetes.

gaming laptop upgrade I: cloning SDD drive to 1TB NVME

Image
I purchased my gaming laptop ( .ca ) in a hurry, at a time when many others were buying theirs, and was unable to get all that I wanted. Compromises had to be made. But this past December, I took the plunge and upgraded the memory and the hard drive (which was already quite fast, but a little too small).

Rediscovering Tmux and Screen

Image
I have recently resurrected some older devices with flaky connectivity and while ssh-ing into them had to use some terminal tricks (aka multiplexers ) to restore connections if disconnected (or to purposely disconnect/reconnect on long commands). I used tmux where possible, but occasionally only GNU screen was available, making a summary of features opportune.

Block Ads and Get Youtube Premium Free!

Image
Youtube is a wonderful platform and its creators deserve to be able to make a living. Many of them actually do by serving Google ads (with Google keeping a significant portion of ad revenue) or, via some Youtube subscription model that was first called Red and now is Premium (this may be inaccurate, I’m not following it closely). If, like me, you dislike a model where Google decides who is worthy of support and who’s not and gets to keep the lion’s share of ad revenue, this article might be for you. If, on the other hand, you have the means to purchase YouTube Premium and don’t have time to waste, go ahead and get it, it’s definitely worth it!

crunch dictionary wordlist for WPA handshake cracking

Image
Despite the numerous vulnerabilities and cracking methods around WPA and its successor, a black hat might find themselves brute-forcing a handshake. If the most common list of passwords fails, (a dictionary attack that automated tools generally employ) the next to try is a list of valid phone numbers in that particular area, which can be easily generated.