Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Category: Internet

  • Home
  • Technology
  • Internet
Microsoft Edge
Apps Internet Tech Tips

How to Make Microsoft Edge More Privacy Friendly

Everywhere you turn, data is be collected about you and your internet activity, usually referred to as telemetry. Luckily, there are steps you can take to help minimize the amount

February 7, 2024
Continue Reading...
Wordpress Behind Reverse Proxy
Internet

WordPress Behind Reverse Proxy

Wordpress installation are usually straightforward. Unfortunately, if you’re using a reverse proxy like Caddy or NGINX in front of your WordPress webserver, you’ll likely run into issues with too many

February 21, 2022
Continue Reading...
Disable Firefox Telemetry
Internet Tech Tips

How to Disable Telemetry Data Collection on Firefox to Increase Privacy

Telemetry is a type of data collection system that collects engineering data about your browsing history. Most of the telemetry data that is collected is hardware and customization based, however

October 9, 2021April 20, 2025
Continue Reading...
ERR_CERT_INVALID Chrome Edge
Internet

How to Access a Site with NET::ERR_CERT_INVALID Error in Chrome and Edge

If you run into the NET::ERR_CERT_INVALID error in Chrome or Edge, sometimes you can click Advanced then Continue Anyway if it is a site you trust. What happens when there’s

August 26, 2021
Continue Reading...
tor browser ubuntu
Linux Internet

How To Install Tor Browser In Ubuntu 18.04 Linux

Tor is free software and an open network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents

October 15, 2018October 15, 2018
Continue Reading...
install tor macos
Mac Internet

How To Install Tor Browser in MacOS

Tor is free software and an open network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents

September 25, 2018
Continue Reading...
How To Setup Let's Encrypt SSL Certificates For An Azure Web App 1
Server Hardening Internet Tech Tips

How To Setup Let’s Encrypt SSL Certificates For An Azure Web App

Everything seems to be moving to “the cloud” these days, and you have a few options such as Microsoft Azure and Amazon AWS to name a few. Depending on your

September 5, 2018February 1, 2019
Continue Reading...
How To Install Tor Browser In Kali Linux 9
Apps Internet

How To Install Tor Browser In Kali Linux

Tor is free software and an open network. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents

September 10, 2016January 4, 2020
Continue Reading...
How To Remove Internet Explorer (IE) From Windows Server 10
Apps Internet Tech Tips

How To Remove Internet Explorer (IE) From Windows Server

If you run any Windows Servers, you may run into a scenario where you want to remove access to Internet Explorer. Usually, any administrators that log into servers won’t have

May 18, 2016October 16, 2016
Continue Reading...
Tweaks to Speed Up Google Chrome For 2016 11
Internet Tech Tips

Tweaks to Speed Up Google Chrome For 2016

A few years ago, I wrote a Tech Tip for Speeding Up Google Chrome. As with any technology, Chrome has released a number of updates since that 2013 article. Most

March 22, 2016October 16, 2016
Continue Reading...

Posts pagination

1 2 Next
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}