Latest Posts

Jan
25

Keeping the VPN Connection Alive: Creative Usage of PING

When I want to be productive, I like to go to relatively quiet public venues like libraries or bookstores. Since I’m not at home, I’m forced to use the public wireless Internet or hack/steal an innocent civilian’s wireless Internet connection (half-joking). Since these connections are normally unsafe to transmit sensitive data, I connect to my home network via VPN-tunneling and encryption. But, usually the public wireless Internet connections I use are pretty spotty. One minute I’m reading an interesting article. Five minutes later, I want to go to the next page. In that five minute interval of no data transfer, I’ve already lost my connection and I have to go through that long process of reconnecting the wireless network and VPN-tunneling to my computer at home.

Read the rest of this entry »

Jan
24

Blocking Unwanted Domain Names: Creative Usage of the HOSTs File

In my previous article, I wrote about how to manipulate the host file so that you can locally view your web site long before Internet propagation is complete. There are other creative uses of the hosts file as well. In the previous article, I let you access what you wanted see. In this article, I will reveal how block what you don’t want yourself or others to see.

Read the rest of this entry »

Jan
24

Why Should You Wait for Internet Propagation?

Two years ago, I switched hosting companies from QualityHostOnline to WebHostingBuzz. It’s not that I didn’t like my previous host. In fact, I thought that my old host was outstanding and I was very happy with them. It was just that (1) I needed more up-to-date IMAP mail servers and (2), with my numerous websites, I needed more bandwidth and space.


Read the rest of this entry »

 
© 2006 and web design of Allan Ray Barizo from [art] [⁄app].
This site is best viewed with FF and at least 1024x768 resolution.