After testing out Pi-hole using containers in Part 1, it is time to deploy it on a more permanent solution so that it can run constantly to protect my entire home network. As the name suggests, Pi-hole is designed to run on Raspberry Pi, and the first step will be to acquire the hardware needed. […]
My PI-HOLE PROJECT – PART 1 DEPLOY USING CONTAINER
Online advertisement is everywhere, I used to tolerate it to a certain extent as I know a lot of web content providers used that as their primary source of revenue. But sometimes it can be so annoying that I wanted to just shut them off. Not to mention the numerous security/privacy issues that can arise […]
My Coast to Coast, Walk the talk run – Jurong Lake to Coney Island
Other then being a tech enthusiast, I am also a running fanatics. With 27 marathons (and counting) under my belt, I am always looking for new challenges to keep my running experience fresh and fun. I recently heard about the new Coast to Coast trail that NParks has been promoting, I thought it would be […]
Azure stack blog posts by the Azure team
I recently came across a series of Azure stack blog posts by the Azure team that I think are excellent. The topics ranges from fundamentals, backup/restore/DR, automation, billing, Self-Service, team collaboration and many more. However, they are not organized in the most optimal way, thus, I have consolidated the links in this page for ease […]
Windows Defender Application Guard – a closer look
I have heard about Windows Defender Application Guard (WDAG) for quite sometime but have not had the chance to investigate further. I came across some articles on it while doing research on container networking and decided to try it out on my own and to document my experience here. In a nutshell, WDAG is a […]