So you want to Host your own…

website, podcast, or collection of your creations or ideas.

Hanging your shingle out on the Internet has always been easy and has only gotten easier over time. Apps, sites, just add you actively creating content that is interesting and fresh for the people whom you attract?

I am attempting to use speech recognition with Cortana and it needs to be trained just like back in the early days of Dragon Dictate when it was a plug-in DSP Card in the Lab at the college I worked at in my Home Town. 🙂

I have just setup and began to use a Windows 10 Pro PC for the first time. Before now, it’s been Mac, Linux & Windows 7 for me mostly.

We are taking a look at the podcast offering on and also looking into hosting podcasts through WordPress on a host

Putting LineageOS on an abandoned phone to get continued Android updates

What do you do with your cell phone that still works cause you are someone that takes good care of their tech and the company doesn’t support it with security updates? Well, there’s a solution that involved Open Source. It used to be call CyanogenMod, it was reborn as LineageOS. Find your device on their wiki and follow the Install recipe laid out after you have installed the Android adb tools to your appropriate Operating System. You can do this from any operating system platform. Windows, Mac, and Linux.


Open Source on OS X and more…

Check out InkScape as an alternative to Adobe Illustrator or maybe you’re a previous Macromedia Freehand user?

Krita is another Open Source painter style program.

Krita is a professional FREE and open source painting program. It is made by artists that want to see affordable art tools for everyone.concept art
texture and matte painters
illustrations and comics

A few links, and thoughts…

Forked this Access Management project for use with our projects. (GITHub)

Adding some teeth to your server…

ever wonder how administrators of high value target technology (HVTT) users (aka Enterprises) fend off their attackers?

Helpful tools, like Denyhosts, Fail2Ban, and others help streamline the management and security of the systems they are responsible for  

A combination of DenyHosts, fail2ban and creating your own server that you perform post-log-inspection on and update a database of the output of fail2ban and denyhosts. As well as using firewalls properly, as per Marcus Ramen’s original creation of the “firewall”. Deny All, Trust few, Filter everyone, Advanced Port Wizardry (ie. Port Knocking, which is actually listed in the thread above and I am not able to upvote it at this time. So I thought I would add some insights.

Using a tool such as SNORT and since you’re using Python/C/ASM (OPS aka Optimal Programming Stack) and being a Pragmatic Programmer #pragmaticprogrammer you have a broad range of skills, abilities with a pro-active preventative style where you enjoy planning ahead for future flexibility of your scalability. see Pythonic Styles like the Zen of Python.

I love the Zen of Python.

The Zen of Python

Beautiful is better than ugly.
Explicit is better than implicit.
Simple is better than complex.
Complex is better than complicated.
Flat is better than nested.
Sparse is better than dense.
Readability counts.
Special cases aren’t special enough to break the rules.
Although practicality beats purity.
Errors should never pass silently.
Unless explicitly silenced.
In the face of ambiguity, refuse the temptation to guess.
There should be one– and preferably only one –obvious way to do it.
Although that way may not be obvious at first unless you’re Dutch.
Now is better than never.
Although never is often better than right now.
If the implementation is hard to explain, it’s a bad idea.
If the implementation is easy to explain, it may be a good idea.
Namespaces are one honking great idea — let’s do more of those! (see excerpt below)

Security is a hot topic and it has been for quite a while. Many years ago, viruses were the only concerns of system administrators. Viruses were so common that it led the way for an astounding range of virus prevention tools. Nowadays, barely anyone would think of running an unprotected computer. However, computer intrusion, or the unauthorized access to your data by malicious users, is the “threat du jour”. Networks have become the target of numerous ill-intentioned hackers which will go to great lengths to gain access to your data. Your best defense against these types of threats is an intrusion detection–or prevention–system. Today, we’re reviewing ten of the best free intrusion detection tools.

.DEC (More to come)

Mimblewimble: How a Stripped-Down Version of Bitcoin Could Improve… | Bitcoin Magazine

Older article from 2016

. dec

Open Source Business Model

is a phrase that has been thrown around at times and applies to many existing examples like RedHat, Cloudera and others.

If you’re thinking about starting a company, don’t let the tail wag the dog. Start with the question “how can I deliver value for customers” and work backward from that. Then piece together the open source components you’ll need for your ultimate solutions that deliver value and construct your software supply chain. At this point, you may decide, like Red Hat, that you want the benefits of collaborative development, or you may decide, like Cloudera, that you want at least some of that to be entirely under your control. The point is you can make that choice without the baggage of “let’s monetize ‘X’”. You’ll be much happier with your choice.

Open Source Business Model, is discussed in a few places by a few authors and their position is that there is not one of “these” and I would suggest that their perspective is skewed by their pre-existing conditioning from their own experiences. I think there are many entrepreneurs that are working in and with Open Source in various ways.

Lots of interesting ideas none the less.

Follow our affiliate link below: