Google agrees to destroy browsing data collected in Incognito mode

They said the quiet part out loud. For a long time we have had little trust in Google. As the saying goes, “if something is free, you are the product” and that is especially true for one of the worst offenders when it comes to privacy. Google Docs, Sheets and Chrome are all great products […]


Vultr: Living up to their name, unacceptable TOS

Theft. Shattered glass.

This morning we received word of a new Terms of Service from one our infrastructure providers, Vultr, owned by Constant.com. Within their TOS they outline that they claim ownership of any content that is placed on their servers. An excerpt from the new TOS (which we have NOT agreed to) is below: ==== information, text, […]


The big deal about WMD DNS Passes

WMD’s DNS Manager We are very excited to debut our DNS manager system! This system allows you to manage DNS records regardless of where they are hosted. The need for this came about when editing DNS records became much more important to managing web services. See, some entities require verification of domain ownership by creating […]




Fix macOS Ventura SSH access denied

The latest version of the Mac operating system, macOS 13 “Ventura” changes the way things are handled with OpenSSH. Certain legacy servers no longer adhere to the security policies of some servers that are running older OpenSSH software, specifically RedHat Enterprise Linux and CentOS Linux prior to version 7. There are a couple of ways […]


When something is free you are the product: Microsoft Edition

Microsoft purchased GitHub in 2018. For those who are not in-the-know, GitHub is a code repository that allows users to work collaboratively with their development team. It is a 3rd-party SaaS offering that offers a free tier and other pair tiers. Now GitHub Users Want to Sue Microsoft For Training an AI Tool With Their […]



The biggest data breach ever (happens every day)

Just when you thought you’d heard about all the latest data breaches (and received the hundredth email telling you your data was stolen) we must shine a spotlight on another insiduous type of data breach that could be stealing and tracking your browsing data on a constant real-time basis. Let’s talk about Real-Time-Bidding, also known […]