Author Archive

scarves & sweaters

i think that it’s brainless to assume that making changes to your window’s view will give a new perspective.

and the hardest part is yet to come

Email

information travels faster & sadder

i intentionally wrote it out to be an illegible mess
you wanted me to write you letters, but i’d rather lose your address
and forget that we’d ever met and what did or did not occur.
sitting in the station, it’s all a blur
of dancehall hips, pretentious quips,
a boxers bob and weave.

Email

Scathing

The party of Lincoln and Liberty was transmogrified into the party of hairy-backed swamp developers and corporate shills, faith-based economists, fundamentalist bullies with Bibles, Christians of convenience, freelance racists, misanthropic frat boys, shrieking midgets of AM radio, tax cheats, nihilists in golf pants, brownshirts in pinstripes, sweatshop tycoons, hacks, fakirs, aggressive dorks, Lamborghini libertarians, people who believe Neil Armstrong’s moonwalk was filmed in Roswell, New Mexico, little honkers out to diminish the rest of us, Newt’s evil spawn and their Etch-A-Sketch president, a dull and rigid man suspicious of the free flow of information and of secular institutions, whose philosophy is a jumble of badly sutured body parts trying to walk

Written by Garrison Keillor, who I usually assume is the boringest person on this planet, satiating the fat minds of NPR listeners everywhere.

Email

updates blupdates

expect some serious updates in the near future — no empty promises here, though i am known for them.

what is on the horizon:

a new design to this site
hobonews — our sick answer to the lack of news for homeless people
maoblog — the tales of our favorite hamsty
the launch of sexy and disgraceful
a renovation of wellplacedpottery

the admin will post a message sometime soon saying what does/doesn’t work

-alec

Email

Firewall vs VPN

Network security typically consists of three different controls: physical, technical and administrative.

If your company needs a firewall, physical protection will protect your internal network. If you have a physical firewall, it will protect your network and your computers, phones and tablets from unauthorized access.

Physical protection controls how much space the network is protected with. In a public-facing network, the network has an unprotected side. The physical protection can be physical barriers like fences, walls and gates, or virtual. This will affect how your firewall can be set up.

Security cameras and alarms are used to detect unauthorized access.

What’s the Difference Between a Firewall and a VPN?

There’s a lot of confusion out there when it comes to VPNs and firewalls and there are some good services that offer a firewall to protect your systems. While many companies are using VPNs as an anti-virus product, it’s important to remember that there are two different types of VPNs:

Proprietary VPN (also called a “tunneling VPN”) is the easiest to set up and is used by the majority of users. A VPN should work in every country of the world. The only VPNs that are “not recommended” are ones that are “unencrypted” and the companies that sell them (most of them are Chinese VPNs that offer “unsecured” or “unencrypted” services).

(also called a “tunneling VPN”) is the easiest to set up and is used by the majority of users. A VPN should work in every country of the world. In most cases you need to download the app for the mobile device and log in with your account credentials before you can use your computer or smartphone. A VPN should be available for your preferred operating system and mobile device. However, sometimes a VPN provider only has a VPN application for its mobile device and not its desktop or laptop. A VPN can make it more difficult to hack, track, and collect personal information on you when you are using a VPN. If you use a VPN, you will need to download a program that you can install on your computer to use the VPN. This software allows your computer to communicate with your mobile device over the internet.

Some VPN providers offer a mobile application called a “Siri/Google Assistant” that can control your smartphone and help you access the internet by entering the VPN’s encryption code or even by giving you access to a secure area in your browser.

When you use a VPN with Windows, there are some additional requirements.

First, you must install the VPN app on your Windows-based PC to begin using VPN. Second, you must allow the Windows Smart Screen feature to be turned on. Third, you must allow Windows to notify you when your PC is attempting to access another operating system. In other words, if you have a VPN installed, Windows 10 will warn you that you’re attempting to access a non-secure operating system. This is necessary so that Windows can warn you if the app is being used in a way that could compromise your privacy.

To get started with your own VPN, follow these instructions.

Email

Hot On The Web