Running a VirtualBox VM in Bridged Networking Mode

Testing the network connection after switching to bridged mode in VirtualBox

I've been playing around with bridged mode in VirtualBox, trying to see how I can get it to work. Turns out it's fairly easy to do, so this article will be somewhat shorter than what I usually write. I just want to look at what I did to enable bridged networking in my VirtualBox VMs … Continue reading Running a VirtualBox VM in Bridged Networking Mode

Before You Start Using a VPN, Read This

Use of VPNs has exploded in the last few years, pushed by increasing awareness of privacy issues among citizens as well as governments and corporations doubling down on their censorship and surveillance efforts. Now that we have AI capable of building frighteningly accurate psychological profiles of people based on their browsing habits, using a VPN … Continue reading Before You Start Using a VPN, Read This

Shell Script for Launching a Local Denial-of-Service Attack

Shell script to launch a local denial-of-service attack

Disclaimer: The following article is written for entertainment and educational purposes only. Neither the script shown here nor any of the techniques involved are intended to be used in real life. Launching denial-of-service attacks is illegal and can get you in serious trouble. I do not condone or support any use of such hacking methods … Continue reading Shell Script for Launching a Local Denial-of-Service Attack

Up and Running: Using the TunnelBear VPN Service Through OpenVPN

In this article I want to talk about one of my tech adventures from shortly after I went on vacation, which is that of getting OpenVPN up and running and using it to contact the TunnelBear servers. TunnelBear is a paid VPN service that provides both end-to-end VPN encryption and anonymous proxying, using AES-256 encryption … Continue reading Up and Running: Using the TunnelBear VPN Service Through OpenVPN

Use SyncTERM as a Remote Login Terminal for the Raspberry Pi

This tutorial will show you how to use the terminal emulator SyncTERM as a remote terminal to a Raspberry Pi. For this you will need two things: 1. a Raspberry Pi running Raspbian and connected to a network; 2. a desktop computer connected to the same network, with SyncTERM installed. The protocol we will be … Continue reading Use SyncTERM as a Remote Login Terminal for the Raspberry Pi

The Ethernet Island

Let's face facts: Being in a group living situation sucks. Though to be fair, it sure beats having to take out a mortgage on a house you can't afford. One thing that has become a problem for me, being the digital control freak that I am and at the same time not living under my … Continue reading The Ethernet Island

How to Block Websites and Prevent DNS Leaks Using Your hosts File

The hosts file is an entity that is present in every major operating system, including MacOS, Windows, and Linux. In Unix-based systems like Linux and MacOS its filepath is /etc/hosts. In Windows its filepath is C:\Windows\System32\drivers\etc\hosts. Although largely a relic of the past, this oft-ignored configuration file can be surprisingly useful even in the modern … Continue reading How to Block Websites and Prevent DNS Leaks Using Your hosts File