LetsEncrypt Without Shell Access

Firstly this article is all about using SSL/TLS certificates to enable HTTPS encrypted connections to websites and web applicaitons. Specifically obtaining LetsEncrypt certificates that are provided for free…

Cold War Computing – Your Data at Checkpoint Charlie

As the world of computing has become pervasive and embedded in the lives of everyone, we have become acutely aware of the importance of our data and the…

Zero Vision

One part of my home sensor network project is to add semi-autonomous camera’s to the network, my initial plans were to have the central RPi hub to manage…

Insecurity and Data Breaches – the New Normal

In a world where major data breaches, cracked password lists, DDoS attacks and organisations being held to ransom over encrypted data are as common as moon phases, it’s…

What a Load of Phishing Rubbish!

The quality of technology reporting often reflects the worst element of the complicated world of digtial, where statements, articles and opinions have no substance but are stating the…

Who’s going to read this?

Sending a message to someone hasn’t really changed since wax seals and quills. We send exponentially more messages per person but the concept hasn’t changed that much, the…

Interruptive Media

It’s hard to take my UXD head off when looking through a site for the first time, trying to experience the site as a true user. But there…

Be a Smart Citizen and Monitor Your Environment

The current buzz word is big data, well there doesn’t come anymore bigger data, except maybe space, than our environment and everything in it. Well the team at…

Cardboard Gear VR

Samsung has just announced it’s entry into the VR headset market the Gear VR, to coincide with the Samsung Note 4 release. Once you dig a little below…

Showrooming May Not Be a Bad Thing

Showrooming may be the perceived scourge of brick and mortar stores, as pseudo customers browse goods on the shelves to make their choices, then follow a second stage…