My personal setup uses a single DAC to handle Bluetooth, USB and optical inputs. Unfortunately, controlling the DAC through Bluetooth is only supported on mobile. Let’s fix that.
This is my second article about Log Pattern Recognition. In this series, we explore different approaches to automated pattern recognition.
When retrieving logs from an application, you are often looking for outliers (such as a unique error) or what pattern occurs the most. However, defining patterns manually is time-consuming and requires rigour across projects. In this series of blog posts, we are going to explore automated Log Pattern Recognition.
In August 2019, I’ve discovered a bug in how the XPS Bios handles a bootable device. This bug allows an attacker with write permission to a bootable device or physical access to the computer to prevent it from booting.
An introduction to AudioContext, and how to protect your browser from being fingerprinted by using the AudioContext Scrambler add-on.
Advertisers are starting to encourage users to use CNAME to masquerade third-party trackers as first-party. Browser extensions do not get access to the DNS answer and are therefore unable to correctly block these trackers. It makes sense to find another way to block these trackers.
An introduction to DNS, DNSCrypt and DNS Over HTTPS. The purpose of this article is not to explain in depth how DNS works, if you want to learn more about DNS, please check the references given in the article. I am only showing an application of what you can do with dnscrypt-proxy.
subscribe via RSS