Tag: Security
-
Creating a Linux user who cannot get an interactive shell on Debian or Ubuntu
This article walks through creating a “service account” to run satellite instances of Rhasspy on a bunch of Debian-based IoT devices scattered around my house so that you aren’t running a service (daemon) as yourself or as root. This creates a situation where if someone where to use the webpage to somehow hack into the…
-
Disable infrared receiver on Apple computers
I’ve had this annoyance for a while now and was too lazy to Google it. I have an iPhone docking station, an iPod docking station and my Apple MacBook.
-
Why I don’t typically use any browser other than Firefox
I’ve talked about Internet Browser security briefly before, but I thought it might be best to follow up with a commonsense commentary on why I favor Firefox over other browsers. On March 18, 2009, TippingPoint’s Charlie Miller, for the second year in a row, hacked an Apple OS-X based laptop in mere seconds. The source…