AI Dementia: When Artificial Intelligence Gets Stuck in Loops

Split-screen image of two work environments

Just recently, I was visiting my father at an assisted living facility. He required short-term therapy, so I visited almost daily. If you’re not familiar with what an assisted living facility is, let me briefly explain: it’s a facility for both long-term patients who may never leave and short-term patients receiving therapy before returning home. … Read more

How to implement fail2ban on Linux?

Introduction Ever checked your server logs and seen thousands of failed login attempts? I did and it was a wake up call. Here’s how Fail2ban helped me go from nearly 6,000 failed logins to almost zero in just a few days. When I wrote my last article, I shared two graphs that told a pretty … Read more

WordPress wp-login Brute Force Proctection

Hosting your own WordPress site is not for the squeamish. However, if you’re like me and you like full control of your site and have the means to host it, why not? It can take a lot of work, considering that foreign adversaries will try to brute force their way into the login page. I … Read more

Why the FBI is Warning About Unencrypted Communication Between Android and iPhones

Android to iPhone unencrypted communication image.

Recently, the FBI issued a warning highlighting a significant security concern: communication between Android phones and iPhones is often unencrypted. To understand this issue fully, we need to break down a few key concepts. What Are Protocols? In simple terms, protocols are rules that determine how devices communicate with each other. Think of a protocol … Read more