How to strengthen my privacy
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Private VPNs give you greater control and privacy, but how do you set one up? Here's how to use the free TurnKey GNU/Linux to create your own VPN.
If your Arch Linux computer supports Bluetooth but you’re not using it, it’ll just be wasting power. Instead of turning it off whenever you boot your computer, disable the Bluetooth service instead.
If you want the highest level of privacy and security with your web browser, you should be using Tor.
If you need to allow others to access your Ubuntu desktop, you might consider enabling the Guest Session feature. This way, those users don't have access to your data.
Today, we are going to see how to encrypt and decrypt files from command line in Linux using a free utility named GNU Privacy Guard (shortly GPG or GnuPG).
If you're a webmaster and want a privacy-friendly way to monitor your website traffic, consider using GoAccess on your Linux server.
We already posted a brief guide about - how to generate a strong password in Linux a while ago. Now, we are going to find out if the generated password is really strong or not. In this short tutorial, we will see how to check the password complexity in Linux from commandline.
Fingerprint authentication is more secure than traditional password-based authentication. Here's how to set up a fingerprint login on Ubuntu.
GPG is software that is generally seen as difficult to use because it was used by typically tech-savvy people in the past. However, in recent years, especially when privacy concerns are on the rise, GPG has become an easy-to-use piece of software for computer users of all levels. It's even easier now to create your own GPG key.
The fingerprint is one of the most common entries for authorization. The use of biometric data for authorization confirms the physical existence of individuals by using an element that is relatively inseparable from them.
The modern user is a privacy conscious one. We want to know what data is being collected and how it’s being used. For Linux users, we embody this mindset ten-fold. Portmaster gives you more control over your data.
If you want to log in to your Linux desktop automatically after boot, consider enabling the auto-login feature on Linux Mint.
Here's how easy it is to add a layer of security to your secure shell logins on Linux.
All files contain some additional information about the data stored in them, also known as metadata. Here's how to remove file metadata on Linux.
If you've any personal or sensitive files stored on your Linux machine, you should consider encrypting them with GnuPG for added security.
Shell scripts can save you time and effort, but if you don't protect your passwords, they can be a liability. Here's how to stay safe.
Looking to increase your own security and privacy, and access restricted content? Here's how to create a cloud-based VPN server to do so.
Securing your files and directories with a strong password is a sure-fire way to prevent unauthorized access and snooping on Linux.
This tutorial shows you how to install Tor browser in Ubuntu Linux. You’ll also learn a few tips around effectively using the Tor Browser.
In comparison to other operating systems, Linux appears to be a more privacy-friendly option out of the box. However, you still need a VPN if you wish to prevent tracking and safeguard your privacy. That's why we'll show you how to set up a VPN on Linux in several ways.