stut-it Martin Stut - Information Technology Tailored to You
Are you looking for someone to assist your organization, your business or even your household with information technology needs? Perhaps you need someone who:
Other gifts and abilities I can offer:
I am here to help. You can utilize my broad knowledge from more than three decades of experience in Information Technology. I have likely already seen a situation like yours and know the hidden challenges and opportunities. I have been involved with numerous large scale IT projects, including international ones, for various Christian organizations, acquainting me with their special needs. I am keenly aware of security issues and understand the need to develop and maintain these projects on a tight budget.
My current part time employment provides me the opportunity to assist small businesses or households with IT improvements without it costing you the normal high cost of IT support. I can offer solutions at a minimal cost, solutions that require little effort and are thus efficient for you.
If you are looking for a German in Germany for managing events, having an address in Germany or similar tasks, I can recommend my wife’s Büroservice Marion Stut (German language only).
subscribe via RSS
In my last post, I described Cryptomator, a free (pay what you want), open-source program that offers transparent, automatic, file-by-file encryption. Now here are detailed step-by-step instructions to get it going.
When you want to store confidential data on less trusted (cloud) storage, you need to encrypt it. Container methods, packing many files into one encrypted container file, like VeraCrypt or ZIP, have disadvantages. Cryptomator is a relatively new, free (pay what you want), open-source program that offers transparent, automatic, file-by-file encryption. Read on for more details.
There are credible claims, outlined in this blog post, that many browser add-ons are sending your full browsing history to analytics companies that may sell this information to anyone willing to pay a certain sum of money. To be sure which browser add-ons are benign, I have used the technique described in this blog post to analyze the traffic generated by certain popular browser add-ons and similar products. The results seem to indicate that the more tracking protection a product claims, the more risk there is that it replaces external tracking with its own tracking.
When starting to use Mitmproxy (see also my blog post about setting it up), you need to remember a significant number of details. To help you in this, I have compiled frequently used items in “cheat sheet” style - no background explanation, but a concise list of vocabulary. Much of this is copied, selected and rearranged from http://docs.mitmproxy.org/ . In the first sections, I’m only listing what I regularly need, while the Appendices contain the full data.
In this post, I’m describing what it takes to set up a website and a few email addresses, if your usual web hosting company won’t do it at a reasonable price. None of these steps are unusual, but it is nice to have them written down in one place, including working examples of the syntax. The target audience are IT technicians, who might end up doing this for several domains.