Featured Post

 

Im so temped to install red star Linux

I have a couple machines doing nothing I may do this on a VM



Every Linux Distro Explained in 17 Minutes

 I use Debian on laptop and Truenas on a server m both wont run Windows with any speed

That PC that wont run Windows 11 will work fine with Linux , its not Ewaste 




Scrapped Openvault for Truenas Scale

 

That’s a classic hardware pivot! Moving from a "bits and bobs" OpenMediaVault (OMV) setup to a dedicated TrueNAS server using medical-grade hardware from Siemens  is a serious step up in reliability, especially given OMV's reputation for being more forgiving of mismatched parts compared to TrueNAS’s stricter requirements. Im happy as a cat with a box of catnip , just need to configure it add more drives from my OMV machine . And its not held together like the Millennium Falcon



Another tool : BlueScreenView Free Windows Crash Dump Analyzer






BlueScreenView is a free utility that helps you analyze “blue screen of death” (BSOD) crash dumps created by Windows when your system crashes. It scans dump files and displays information about all crashes, helping users troubleshoot system issues quickly and efficiently.

Firm Data on AI

Data and txt from  www.nber.org/papers/w34836



 We present the first representative international data on firm-level AI use. We survey almost 6000 CFOs, CEOs and executives from stratified firm samples across the US, UK, Germany and Australia. We find four key facts. First, around 70% of firms actively use AI, particularly younger, more productive firms. Second, while over two thirds of top executives regularly use AI, their average use is only 1.5 hours a week, with one quarter reporting no AI use. Third, firms report little impact of AI over the last 3 years, with over 80% of firms reporting no impact on either employment or productivity. Fourth, firms predict sizable impacts over the next 3 years, forecasting AI will boost productivity by 1.4%, increase output by 0.8% and cut employment by 0.7%. We also survey individual employees who predict a 0.5% increase in employment in the next 3 years as a result of AI. This contrast implies a sizable gap in expectations, with senior executives predicting reductions in employment from AI and employees predicting net job

 creation.



 Link to the paper and the PDF 

Risk Assentment on me installing openclaw on a PC




Im still unsure if I install this a VPS will cost me about $20 a month . as doing it locally could be dangerous  


Risk Assentment on me installing openclaw on a vps

Installing 

OpenClaw on a VPS is a high-risk activity that essentially creates a remote administrative panel for your server. While a VPS provides better isolation than your personal laptop, it remains highly vulnerable if misconfigured. 

Critical Risk Factors

  • Autonomous Shell Access: OpenClaw is designed to execute terminal commands and manage files. If compromised, an attacker gains immediate, high-level control over your VPS.
  • Prompt Injection (Indirect): This is the most "spicy" risk. Attackers can hide malicious instructions in emails, web pages, or files that OpenClaw reads. The agent may then silently execute these commands—such as exfiltrating your API keys or deleting data—without your knowledge.
  • Unvetted "Skills" Ecosystem: The "ClawHub" and other community repositories contain hundreds of malicious scripts (trojans) that can steal cryptocurrency, SSH credentials, and browser passwords once installed.
  • Default Vulnerabilities: Versions prior to 2026.1.29 contain a critical Remote Code Execution (RCE) flaw (CVE-2026-25253) that allows an attacker to hijack your gateway via a simple crafted link.
  • Sensitive Data Exposure: OpenClaw often stores API keys and tokens in plain text by default. 

Risk Mitigation Strategies

  1. Never Expose the Gateway: Bind the OpenClaw Gateway to 127.0.0.1 (localhost) only. Access it remotely via a private network like the Tailscale VPN or NordVPN Meshnet instead of opening public ports.
  2. Mandatory Sandboxing: Run all agents in Docker containers with restricted network access and non-root users to limit the "blast radius" of a breach.
  3. Principle of Least Privilege:

1.                  Create dedicated, empty email and cloud accounts specifically for the bot.

2.                  Never connect password managers or primary financial accounts.

3.                  Restrict shell commands to a strictly defined allowlist.

  1. Human-in-the-Loop: Do not enable "auto-approve" for sensitive tasks like command execution or file deletion.
  2. Immediate Patching: Ensure you are running version 2026.1.29 or later to resolve known critical vulnerabilities. 

Would you like a list of specific firewall rules or a Docker Compose configuration to help harden your VPS setup? 

You ditched Top Gear !


But this happing worldwide . I pay $19 a month NZ for YouTube and I get NO ADDS . I get to see stuff I want and it is the worlds biggest help me file .

I would love to know how well Amazon did with Grand Tour


Acer Asprie ONE with Kali Linux

 I got this Netbook somewhere sometime .I  want to do something with it tried other distros it just didnt run fast enough , I didnt have a stand a lone machine with Kali (debian based) , only had it running on Oracle Virtual box . which isnt bad but it chews up resources .on my desktop  



      



What Is Pi-hole & Why Would You Want To Use It?




Pi-hole is a network-wide ad-blocking application that acts as a DNS sinkhole, blocking advertisements, trackers, and malicious domains for all connected devices. By acting as a DNS server, it prevents ads from loading before they reach devices, improving network speed and performance. It is typically installed on low-power devices like a Raspberry Pi. 
Key Benefit 
  • Network-Wide Protection: Protects all devices (computers, smart TVs, IoT, mobile) without requiring individual client installations.
  • DNS Sinkhole Technology: Intercepts DNS requests for known ad/tracker domains and prevents them from loading.
  • Performance Improvement: Reduces bandwidth usage by blocking unwanted content.

Building a Pi-hole creates a network-wide ad blocker that protects every device on your network without needing individual browser extensions. As of January 2026, the most reliable way to set one up is using a Raspberry Pi or any Linux-compatible device. 
1. Requirements
  • Hardware: A Raspberry Pi (model 3B+ or newer is recommended for performance, though older models work).
  • Storage: A 16GB Micro SD card (Class 10 recommended).
  • OS: Raspberry Pi OS Lite (64-bit preferred).
  • Power & Connectivity: A stable power supply and an Ethernet cable for a more reliable connection than Wi-Fi. 
2. Prepare the Operating System
  1. Flash the OS: Use the Raspberry Pi Imager to write Raspberry Pi OS Lite to your SD card.
  2. Enable SSH: In the imager's "Advanced Options," enable SSH and set a username/password so you can manage the Pi remotely.
  3. Boot & Update: Insert the card into your Pi, power it on, and log in via SSH (e.g., ssh username@pi-hole.local). Run the following command to ensure the system is current:
    sudo apt update && sudo apt upgrade -y.
     
3. Install Pi-hole 
Run the official automated installer with this command: 
bash
curl -sSL 
Use code with caution.
bash
https://install.pi-hole.net
Use code with caution.
bash
 | bash
Use code with caution.
 
During the setup wizard:
  • Static IP: Confirm your current IP as static so your router doesn't change it.
  • Upstream DNS: Select a provider like Cloudflare (1.1.1.1) or Google to handle requests that Pi-hole doesn't block.
  • Web Interface: Select Yes to install the Admin Web Interface for easy management.
  • Finish: At the end, note the Admin Password displayed on the screen. 
4. Configure Your Network
To make Pi-hole work for your whole house, you must point your router's DNS to the Pi's IP address. 
  1. Log into your Router Admin Panel (often 192.168.1.1).
  2. Find the DHCP or LAN Settings.
  3. Change the Primary DNS Server to your Pi-hole's IP address.
  4. Save and reboot your router. 
5. Access the Dashboard 
Once set up, you can monitor blocked traffic by visiting http://pi.hole/admin or http://[Your-Pi-IP]/admin in any browser on your network. 
Note: For advanced users, Pi-hole can also be deployed as a Docker container for easier maintenance and portability. 

These guides detail the hardware, software, and network configuration steps for building a Pi-hole ad blocker: 

Building a Pi-hole creates a network-wide ad blocker that protects every device on your network without needing individual browser extensions. As of January 2026, the most reliable way to set one up is using a Raspberry Pi or any Linux-compatible device. 
1. Requirements
  • Hardware: A Raspberry Pi (model 3B+ or newer is recommended for performance, though older models work).
  • Storage: A 16GB Micro SD card (Class 10 recommended).
  • OS: Raspberry Pi OS Lite (64-bit preferred).
  • Power & Connectivity: A stable power supply and an Ethernet cable for a more reliable connection than Wi-Fi. 
2. Prepare the Operating System
  1. Flash the OS: Use the Raspberry Pi Imager to write Raspberry Pi OS Lite to your SD card.
  2. Enable SSH: In the imager's "Advanced Options," enable SSH and set a username/password so you can manage the Pi remotely.
  3. Boot & Update: Insert the card into your Pi, power it on, and log in via SSH (e.g., ssh username@pi-hole.local). Run the following command to ensure the system is current:
    sudo apt update && sudo apt upgrade -y.
     
3. Install Pi-hole 
Run the official automated installer with this command: 
bash
curl -sSL 
Use code with caution.
bash
https://install.pi-hole.net
Use code with caution.
bash
 | bash
Use code with caution.

 

During the setup wizard:
  • Static IP: Confirm your current IP as static so your router doesn't change it.
  • Upstream DNS: Select a provider like Cloudflare (1.1.1.1) or Google to handle requests that Pi-hole doesn't block.
  • Web Interface: Select Yes to install the Admin Web Interface for easy management.
  • Finish: At the end, note the Admin Password displayed on the screen. 
4. Configure Your Network
To make Pi-hole work for your whole house, you must point your router's DNS to the Pi's IP address. 
  1. Log into your Router Admin Panel (often 192.168.1.1).
  2. Find the DHCP or LAN Settings.
  3. Change the Primary DNS Server to your Pi-hole's IP address.
  4. Save and reboot your router. 
5. Access the Dashboard 
Once set up, you can monitor blocked traffic by visiting http://pi.hole/admin or http://[Your-Pi-IP]/admin in any browser on your network. 
Note: For advanced users, Pi-hole can also be deployed as a Docker container for easier maintenance and portability. 
These guides detail the hardware, software, and network configuration steps for building a Pi-hole ad blocker: