Categories
Privacy Site news

No more new contents until AI is properly regulated

I won’t add new contents to this site until AI is properly regulated. I won’t go as far as removing old contents – for now. AI is now fully in the phase that Shoshana Zuboff called the disposession cycle in her “The age of surveillnace capitalism”. I’m not going to feed the AI beast.

Categories
Networking

DHCP, VLANs and subnets in home networks

In the article VLANs for home networks I wrote about how VLANs and subnets can improve network security by creating different segments, usually associated with a subnet. With multiple subnets, assigning addresses in each subnet via DHCP becomes more complex. DHCP IPv4 uses broadcast packets to ask for an IP address. VLANs create separate broadcast […]

Categories
Networking Security

DNS for home networks

In very simple terms, a Domain Name Service (DNS), is a service that turns specific network names (host names, service names) into IP addresses. It allows to use mnemonic names (mypc.example.com) instead of IP addresses (192.168.121.234) accessing internal network resources. There are several advantages in using DNS names instead of IP addresses directly: One simple […]

Categories
Networking

QoS for home networks

QoS stands for Quality of Service and in a computer networks means a set of technologies to improve the perceived quality of network services, by modifying how network packets are managed, prioritizing the delivery of specific ones, as defined by a set of rules. Usually network packets are processed using the simple FIFO (First In, […]

Categories
Networking Security

VLANs for home networks

Home networks are becoming increasingly complex, and security threats as well. Once they were used mostly for personal communications, and entertainment. Now work at home, home automation, and more and more complex tasks performed online at different security levels make simple flat networks inadequate, especially form a security perspective. Does it really make sense that […]

Categories
Networking Security Software development

Manage your own PKI with XCA

Protecting connections with TLS requires the proper certificate/private key pairs, that need to be issued by a trusted Certificate Authority. You can buy certificates form several public CAs, or obtain free ones form entities like Let’s Encrypt. Sometimes you may need your own private CA and certificates for systems that do not need to be […]

Categories
Networking Photography

Setting up FTP behind NAT for Canon cameras uploads

Recent Canon cameras allow for direct uploads from the camera to different Internet services. Some of them are mediated through the image.canon gateway (i.e. Flickr, Adobe, Google), the camera uploads images to the gateway that in turn transfers them to the end service. Since those services APIs can change over time, it’s not a bad […]

Categories
Uncategorized

All your emails are belong to MS

Microsoft is going to replace – again – the basic Windows email application. After Outlook Express and Windows mail, that despite some huge vulnerabilities were quite usable, the simple but adequate for a touch UI interface Mail in Windows 8, and the very limited and ugly Mail in Windows 10, it’s time of Outlook for […]

Categories
Networking

Vigor 165 SNMP monitoring

Monitoring network equipment is usually a good way to be notified quickly about issues that could impact operations requiring network connectivity. One way to monitor equipment is using SNMP – Simple Network Management Protocol. “Simple” is a bit an oxymoron, because the underlying settings – just look at MIBs – are far from being simple. […]

Categories
Uncategorized

Sandon Utensileria 1936-2018

Ho dedicato una pagina al ricordo dell’azienda di mio nonno e mio padre, la Sandon Utensileria, che dal 1936 per ottantadue anni ha rifornito le aziende di Milano e dell’hinterland, e non solo, dalla sede in via MacMahon a Milano.