OpenSSH with SSH key login, this is how it works
OpenSSH with SSH key login, this is how it works The login with SSH key still causes problems for many. In fact everything is described how it should be set…
OpenSSH with SSH key login, this is how it works The login with SSH key still causes problems for many. In fact everything is described how it should be set…
Part 4:Mining with CLI (Command Line Interface) | Beginners In the third part we deal with mining via the CLI (Command Line Interface) without user software. Further links to the…
Crypto | Atomic Wallet | Hacked or not ?! According to reports, the popular crypto wallet Atomic has been hacked. What is it ? Caution is advised in any case…
Part 3:Mining | NiceHash Mining with User Software | Beginner In the third part, we deal with an easy introduction to mining, using NiceHash's application software. This post does not…
Safety Video: Thailand traffic Thailand has some of the most dangerous traffic in the world It is a traffic with extremely high traffic volume, a "living traffic" as I like…
Passkey | Google set up The introduction of Passkey has been slow, now Google has finally released the service. How to secure your Google account with Passkey ! The step…
At around 10:50 p.m. on June 26th, 2023, a triangular flying object with five strong whitish lights flew over Pattaya (Thailand).
Blue Wallet discontinues the service lndhub.io. This means that Lightning Wallets will expire on 30.04.2023. Please check if you are affected and withdraw your money if necessary.
Part 2:Mining | UnMineable Mining with user Software | Beginners In the second part, we will deal with an easy introduction to mining, using UnMineable's application software.In the second part,…
Part 1:Mining | What you need to know - Basics Theory no practice, the practice comes in the following videos. In these 30 minutes I explain the basics you should…