|| Tech House || Episode #007 – What to do when your website gets hacked

Thanks Douglas Adams for the sage-like advice. www.douglasadams.com/creations/hhgg.html

Thanks Douglas Adams for the sage-like advice. www.douglasadams.com/creations/hhgg.html

Hey there,

For this episode of Tech House James and I talk political hackers, what to do if your site gets hacked and how to prevent it happening in the first place. Some key points are:

  1. Don’t panic
  2. Don’t take it personally
  3. Contact your hosting provider or ask a friend to help
  4. Search online for a local web development company to help out. Where I work at, Meta Digital, specialise in fixing hacked sites.
  5. Don’t get hacked in the first place πŸ˜‰
    1. Keeping your website’s content management system (CMS) up to date
    2. Install security plugins/modules
    3. Setup a backup system

Related links:

Peace,
Dr H.

|| Tech House || Episode #006 – Disk encryption

Micah Lee and Edward Snowden. Photo: Sue Gardner.

Micah Lee and Edward Snowden. Photo: Sue Gardner.

Woo hoo 2016, here we come!

The first Tech House for the year. I jumped in the RDU 908.5 FM studio with James Dann and talked about what’s coming up this year. We chatted about Micah Lee’s interview with Edward Snowden in November 2015. I also touched on disk encryption, Bitcoin, and all sorts of new year guff.

Big props to the crew at Linux Voice for their wise words and hard work in the world of free and open software.

#2016YearOfPrivacy πŸ˜‰

Links mentioned in the show:

Peace,
Dr H.

 

|| Tech House || Episode #005 – Kiwicon review / Internet of Garbage Things

Screen Shot 2016-01-15 at 3.15.38 pm

Hey Cyberspace,

Just had a blast @ Kiwicon 9, such an amazing conference. I can totally recommend this for people who anyone interested in tech or anything geeky.

Peace,
Dr H.

 

|| Tech House || Episode #004 – Big Tech stands up for Strong Encryption

Padlock on keyboard

Photograph: Lasse Kristensen / Alamy/Alamy / The Guardian.

Hey ho,

Despite being badly behaved from time-to-time the big tech companies are standing up to renewed government calls for weakening encryption to “help fight terrorism”. Listen in to find out what you can do to help.

Peace,
Dr H.

|| Tech House ||
Your guide to technology, security and free software.
Episode #004

|| Tech House || Episode #003 – How Google tracks you

Big brother Google

Source: http://donttrack.us/

Wasssuuuppppssssss Internets!!!

Yet another installment of Tech House with James from Up Again on RDU 98.5 FM. Who’s looking over your shoulder? Big brother Goog’s maybe? Well, what are they doing and how can you avoid being tracked?

Peace,
Dr H.

|| Tech House ||
Your guide to technology, security and free software.
Episode #003

  • 5 Minute IT Pro Tip #3
    • https://duckduckgo.com/bang
      • !w – Wikipedia
      • !sp – Start Page – Googles search results without being tracked
      • !di – dictionary.com

|| Tech House || Episode #002 – Free, Libre and Open Source Software on RDU 98.5 FM

Software being freed :D

Source: http://blogs.itpro.es/danialonso/que-es-el-software-libre/

Hey World Wide Wicked Cats,

James from Up Again on RDU 98.5 FM kindly hosted me on his show again. This time we talked Free, Libre and Open Software. It’s a big complicated topic we managed to have some good dialogue. Check out the audio and show notes below for further explanation.

Peace,
Dr H.

2nd November – Tech House by Up Again With James Dann on Mixcloud

|| Tech House ||
Your guide to technology, security and free software.
Episode #002

Free, Libre and Open Software

  • What is Free, Libre and Open Software?
    • Free and Libre Software is defined by 4 freedoms:
      • The freedom to run the program, for any purpose.
      • The freedom to study how the program works, and adapt it to your needs.
      • The freedom to redistribute copies so you can help your neighbor.
      • The freedom to improve the program, and release your improvements to the public, so that the whole community benefits.
    • What is Open Software?
      • Is code that covers some of the 4 freedoms but it can also be used in closed or proprietary software
  • Why does it matter?
    • Privacy
      • If you’re using a proprietary IM app and the maker says there’s no NSA backdoors in it you have to take their word for it. If it was free and open and you had the ability you could inspect the code for yourself.
    • Security
      • If you’ve had a proprietary pacemaker implanted and bad guys find bugs in the code they could physically threaten you. If the code was free and open the wider tech community could find the bug and responsibly advise the maker before the bad guys could use it.
  • Examples of Free, Libre and Open Software include:
    • Firefox Web Browser
    • Linux – the program which controls the hardware that all Android phones use
    • Signal – an iOS and Android app that allows you to easily send and receive encrypted text messages and phone calls

|| Tech House || Episode #001 – Password Management on RDU 98.5 FM

Last Week Tonight with John Oliver: Edward Snowden on Passwords

Last Week Tonight with John Oliver: Edward Snowden on Passwords

Good morning InterWebs!

Exciting news! James Dann from the ‘Up Again‘ breakfast show on RDU 98.5 FM invited me to create a new technology feature for the show. James is an old friend and I’ve been involved with RDU off and on for 15 years so I thought, why not! We decided to call the segment || Tech House || and since it’s me we’re gonna focus on security, privacy, and free, open, and libre software (FLOSS). For a bit of nostelgia we’ve borrowed the theme song from ‘Beyond 2000‘ as our intro music.

On episode one we focused on password management, the director of the CIA recently had his personal email account hacked… lolz.

Tech House 001 by Up Again With James Dann on Mixcloud

|| Tech House ||
Your guide to technology, security and free software.
Episode #001
Password Management

That’s where it’s at! See ya next time!

Yours in tech,
Dr Hitchcock.

NB: Background image borrowed from https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/