- (Top)
- How Did We End Up Here?
- Sending Files Over the Internet

- Where is Here?

- The Domain Name System

- Getting Here Safely
- Vulnerabilities

- What Can We Do?

- What We Will Do

- VPN Building

- Step 1: Tailscale VPN
- Step 2: Pi-Hole + Unbound
- Containers

- Computer Security
- Building the Containers

- stunnel (optional)
- Running & Stopping
+ 
- Automating (Linux)

- Firewall

- Configuration

- What’s next...

- Getting There Safely

