Categories
News Technical

Welcome to Google Voice

Google Voice, the popular and often controversial VoIP, voicemail, and messaging service from Mountain View search giant Google is now open for anyone in the U.S. to use. Previously, you could only open a Google Voice account if you received an invitation from a user already participating in the program. Quote from the people at […]

Categories
News Technical

WordPress Version 3.0

Today, the newest version of popular open source blogging software WordPress was released. Version 3.0, also known as “Thelonious,” has undergone a significant number of improvements, such as the inclusion of new standard APIs that let theme developers easily implement new backgrounds, headers, menus, custom posts, and more. All of the new APIs are shown […]

Categories
How-To Technical

No more ‘thumbs.db’ for me

I fist must state that these steps I am about to provide are to be used by those of us whom are neurotic about files stored on the file system.  While there are some good security reasons one may want to do this; I do what I am going to describe because I feel they […]

Categories
How-To Software Technical

Mounting a remote file system using ssh (sshfs)

For some time I have always used tools such as scp sftp to copy files between Linux based systems. Until the growing need to have this process simplified.  I recently fell in love with Linux all over again with the new release of Ubuntu.  I always had known it was possible but never had the […]

Categories
How-To Technical

Configure Firefox to use SSH tunnel for DNS

If you are using SSH to tunnel your web traffic, to keep your information private, you might be vulnerable to a DNS man-in-the-middle attack.  If your DNS requests are not tunneled, the operator of the hostile (or locked down) network can still see where you are navigating to on the web when your client makes DNS requests […]

Categories
Personal Technical

Google SSL – Privacy I believe in

Today I got wind of a new beta from Google.  Google search over SSL.  Now you can have an end to end search that is encrypted between your computer and our friends over at Google.  This will protect your search terms and results from third parties such as your ISP, or company network admins who […]