Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

Raspberry Pi Projects

Raspberry Pi Projects NexcloudPi Since I built my Home-Lab Server I have been migrating all my services to Docker Containers. Before that I was looking for a easy and straightforward way to host my files without having to rely on a NAS, since I had already a bunch of 2tb hard drives lying around I […]

Darknets

Darknets The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The darkweb, commonly referred to as the darknet, […]

Wireless

A wireless access point (WAP), sometimes known as an access point (AP), is a networking hardware component that enables other Wi-Fi devices to connect to a wired network in computer networking. The AP could be an independent device with a physical connection to a router, but it could also be an essential part of a wireless router.

Home Lab

Home Labs Why would you build a Home Lab? Building a home lab can be beneficial for a variety of reasons: Learning and experimenting with new technologies and software Developing and testing new ideas and projects Providing a safe and controlled environment for troubleshooting and problem-solving Saving money on cloud or other hosting costs Improving […]

Home Network Design

Before we dive into the nitty-gritty of configuring your network, let’s take a step back and understand why security is so crucial. Here are just a few reasons why:

Data Protection: With sensitive information like personal photos, financial documents, and passwords stored on your devices, it’s vital to keep them safe from unauthorized access.
Identity Theft: Hackers can use your network to gain access to your online accounts, stealing sensitive information and causing identity theft.
Vulnerability Exploitation: Outdated or un-patched software can leave you open to attacks from malicious actors, giving them a foothold in your network.

Firewalls

Firewalls Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. […]

Commercial Networks

Commercial Networks Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus […]

Cybersecurity

Cybersecurity Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. […]