How to strengthen my privacy
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Tails (The Amnesic Incognito Live System) is a free and open-source operating system that prioritizes online privacy and anonymity. Key features and functionalities of Tails include its privacy-focused nature, its ability to leave no trace on the computer's hard drive, and its integration with the Tor network.
You probably have documents you'd like to keep out of prying eyes. These may include contracts, wills, bank account details, or deeds that contain personal information about you or your family.
Linux servers typically don’t typically install with GUIs, as a command line is faster. But without GUIs, what do you do about passwords?
Looking to change your old password on Ubuntu? It's easy to do so through the terminal. Let's examine how this can be done in a straightforward tutorial.
Waterfox is a lightning-fast web browser that is entirely independent and built on Firefox technology, ensuring absolute data privacy by never accessing your personal information.
This guide explains VPN installation and configuration processes on Linux systems. We demonstrate these processes for OpenVPN, ProtonVPN, and NordVPN.
Here's a step-by-step guide to installing the WireGuard VPN on Windows, MacOS, Linux, iOS, and Android.
Hashcat is for those who are in the computer security field and want to test the strength of the password to perform security audits. In short, it is an advanced password recovery tool that supports various hashing algorithms with extensive options for password cracking.
Bitwarden is a password manager that offers both SAAS service and the opportunity for admins to create their own password manager server using the open-source Bitwarden server. Whereas to manage, save and sync passwords from the local system, it also offers client applications.
Private VPNs give you greater control and privacy, but how do you set one up? Here's how to use the free TurnKey GNU/Linux to create your own VPN.
If your Arch Linux computer supports Bluetooth but you’re not using it, it’ll just be wasting power. Instead of turning it off whenever you boot your computer, disable the Bluetooth service instead.
If you want the highest level of privacy and security with your web browser, you should be using Tor.
If you need to allow others to access your Ubuntu desktop, you might consider enabling the Guest Session feature. This way, those users don't have access to your data.
Today, we are going to see how to encrypt and decrypt files from command line in Linux using a free utility named GNU Privacy Guard (shortly GPG or GnuPG).
If you're a webmaster and want a privacy-friendly way to monitor your website traffic, consider using GoAccess on your Linux server.
We already posted a brief guide about - how to generate a strong password in Linux a while ago. Now, we are going to find out if the generated password is really strong or not. In this short tutorial, we will see how to check the password complexity in Linux from commandline.
Fingerprint authentication is more secure than traditional password-based authentication. Here's how to set up a fingerprint login on Ubuntu.
GPG is software that is generally seen as difficult to use because it was used by typically tech-savvy people in the past. However, in recent years, especially when privacy concerns are on the rise, GPG has become an easy-to-use piece of software for computer users of all levels. It's even easier now to create your own GPG key.
The fingerprint is one of the most common entries for authorization. The use of biometric data for authorization confirms the physical existence of individuals by using an element that is relatively inseparable from them.
The modern user is a privacy conscious one. We want to know what data is being collected and how it’s being used. For Linux users, we embody this mindset ten-fold. Portmaster gives you more control over your data.