Introduction Here is a link to the original LinkedIn article. Welcome to the 4th and final part of my series: Pi Hole as a Cyber Security tool. I have written in length about how to install and set up the system. DNS Sinkholes can be used as a form of security hardening: aligned to different frameworks. The […]
Introduction This is the third part in a series about using a Pi Hole as a Cyber Security tool. My previous articles are available and easy to access. Click here for the original LinkedIn article. Methodology Install Pi Hole on Raspberry Pi Create Ubuntu Server in Cloud Install Splunk on Ubuntu Server. Install Splunk Universal […]
“Pi-Hole as a Cyber Security Tool” This project investigated the effects of Pi Hole on telemetry data, tracking, malware and adware.