This installment will start by fleshing out how systemd-resolved routes queries. From there, I will outline how to configure DNS on a per-link basis. To close, I will reflect on why it’s so difficult to get simple, consistent, and actionable information on this subject...
Our topic today is configuring desktop Linux DNS settings. It’s simple in principle and can yield privacy, security, and availability benefits. Yet despite how straightforward it is in theory and historically was in practice, customizing your device’s DNS is no longer an intuitive matter.
It pays to know these Unix basics considering there is often a Unix/Unix-like OS somewhere in the abstraction hierarchy. If that layer is unsound, the whole edifice risks collapse.
Writing about technology over the years I've produced many guides on how to do cool stuff with your computer. However, without the right foundation, even the most thorough guide can leave room for pesky variables to creep in. This made me realize how important it is to establish what firm footing fo...
In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...
In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi.
For the majority of consumers, cutting the cable TV cord is a mixed bag for a variety of reasons. The big misconception is that you will drastically lower your cable bill. That is not the case unless you can also pickup free TV reception from an antenna. Otherwise, you will need to use a video strea...
This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...
Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...
For understandable reasons, people feel worn down by the volume and composition of the media coming at them. This fatigue stems from a few compounding factors. There is a strong perception that the character of the information presented by the media is warped by highly polarized players. Nearly two-...
Accessibility of service
Convenience in any situation
Cost-effectiveness
Eco-friendliness
No need for parking
Safe ride when having too much fun
Enter your Username and Password to sign in.