Categories
How-To Personal Software Technical

Network Wide Ad & Malicious Website Blocking | Pi-Hole

For a few months now I have used the software package named Pi-Hole as an internal network DNS server to prevent ad sites in addition to malicious websites from being accessible form compute resources on my home network. Pi-Hole is a small install that can be installed on any Linux system and it works like […]

Categories
How-To Software Technical

Retrieve MX records using nslookup

One of my new kids on the block asked me a question tonight; “Jermal, how do I get the mx record of a domain?” To retrieve mx record information we need to use a tool called nslookup which is available in Windows and Linux The quick syntax use is nslookup [-option] [hostname] [server]   Example of […]

Categories
News

Over 300,000 hit by Internet blackout

According to the FBI, on Monday July 9th over 300,000 computers will no longer be able to access the internet due to a malware infection known as “DNS Changer Trojan”. The internet outage for these computers is due to the FBI shutting down the ring of cyber-criminals responsible for creating the Trojan late last year […]

Categories
How-To Software Technical

Tunneling Firefox traffic over SSH

Paranoia, Security or Privacy Issues; All are reasons why I tunnel my web traffic though a SSH Tunnel via a remote machine.  In most cases I do this because I do not trust the network I’m on and don’t want to send unencrypted traffic through it.  In some cases firewalls or local network DNS prevent […]

Categories
How-To Software Technical

Vyatta Network Stats (NTOP) Install

I don’t have much to say here, other than I wanted to see something real time or close to it about how the traffic is flowing on my Vyatta Router so I looked for some info and found it.  I am sharing it here for others and future reference on my own part. The first […]

Categories
How-To Technical

Configure Firefox to use SSH tunnel for DNS

If you are using SSH to tunnel your web traffic, to keep your information private, you might be vulnerable to a DNS man-in-the-middle attack.  If your DNS requests are not tunneled, the operator of the hostile (or locked down) network can still see where you are navigating to on the web when your client makes DNS requests […]