Time Machine set up and use
Time Machine set up and use (Apple MacOS) so that you can perform a disaster recovery, and for general use.
Around the security of data, network, firewalls …
Time Machine set up and use (Apple MacOS) so that you can perform a disaster recovery, and for general use.
Pi Hole Fix for DNS and fine-tuning. In this post, we test Pi-Hole DNS records, IPv4 und IPv6, and adjust the settings.
Pi-Hole AD blockers, DNS servers and network control are indispensable nowadays. Installation setup is available here.
The second part deals with BORG Backup locally and remotely, now with backing up a remote SERVER, PC, or notebook.
BORG Backup locally and remotely, with the main focus on backing up remote systems. Here's how it works!
Surely I could have included OpenSSH with SSH key login, this is how it works in the last post. But you will always find yourself in a situation where you…
The login with SSH key still causes problems for many. In fact everything is described how it should be set up to work - but … yes there are many…
The introduction of Passkey has been slow, now Google has finally released the service. How to secure your Google account with Passkey ! The step by step guide is in…
In many cases the Native SQL Login is not applicable, what remains is the user and password login. In most SQL databases the user "root" is equipped with all rights.…
In this update about Passkey you will learn how to get a Passkey, what to look out for and how to log in with a Passkey.