How to strengthen my privacy
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Here's how to install and use the Authenticator 2FA desktop client on Linux.
Linux is a multiuser operating system, so creating numerous user accounts is easy. Over time, it’s easy to lose track of which accounts are required. Listing user accounts helps you manage them.
Secure your privacy while surfing online by installing Tor browser on Rocky Linux 8 RPM-based Linux using command terminal.
Learn how to get a secure, private and portable OS with Tails. "If you want a safe and private operating system here you have one of the best. And transportable anywhere in a pocket, connectable by USB in millions of computers, without having to modify anything in the host system (if you don’t want to) and without leaving a trace once you finish."
Generating a self-signed certificate is rather easy on Linux. Here's how you can create one from the Linux terminal.
If you're concerned about online privacy, then you should give the Tor Browser a try. It's free and open-source and enables anonymous Internet communication. Check it out!
If you've made the switch to AlmaLinux, you should enable 2FA for SSH authentication for more secure logins. Learn how to enable SSH 2FA on AlmaLinux in this tutorial.
Want to ensure your Linux PSKs are secure? Learn how to create a strong pre-shared key in Linux in this tutorial.
GNOME and KDE now support fingerprint login through system settings. Learn how to add this convenient feature to your Linux desktop.
"Sure Linux is the most secure OS out there, but can we trust third-party apps and your Internet Service Provider? Definitely not." Learn how to install the Tor browser on Ubuntu Linux to protect your privacy online and gain full control of your data in this Fossbytes tutorial.
Looking to protect your privacy online and surf the web anonymously? Learn the simple steps to enable Tor Network and install Tor Browser on the Ubuntu 20.04 or 18.04 LTS using the command line terminal.
Wireguard is an open-source cross-platform VPN implementation that uses state of the art cryptography and provides faster, simpler and more functional VPN tunneling than the IPSec and OpenVPN protocols. Learn how to set up Wireguard on CentOS 8 in this HowtoForge tutorial.
Learn how to set up WireGuard VPN - an innovative VPN (Virtual Private Network) technology that utilizes state-of-the-art cryptography - on Ubuntu 20.04 to act as a VPN server. This setup can be used to surf the web anonymously, bypass Geo-restricted content, allow remote workers to connect to a corpoarte network securely and protect against Man in the Middle attacks.
Want to hide sensitive files and folders from your Linux desktop file manager? Learn about one method for doing this in a helpful tutorial.
Defense in depth is critical in securing your systems, and MFA is an excellent layer of security to add. Learn about MFA and how to implement it with the Google Authentication module in this helpful tutorial.
Are you an Ubuntu user looking to set up WireGuard VPN server on an Ubuntu 20.4 LTS Linux server? Wondering how you can configure Ubuntu 20.04 as the WireGuard VPN server? Find out in this tutorial.
Are you a CentOS 8 user looking to protect your privacy with WireGuard VPN? Learn how to install and configure WireGuard VPN on your CentOS 8 Linux system in this helpful tutorial.
The makers of NordVPN have come out with a new version of their NordPass password manager. Find out how to install and use it.
Password security involves a broad set of practices, and not all of them are appropriate or possible for everyone. Therefore, the best strategy is to develop a threat model by thinking through your most significant risks—who and what you are protecting against—then model your security approach on the activities that are most effective against those specific threats. The Electronic Frontier Foundation (EFF) has a great series on threat modeling that I encourage everyone to read.
The first article in this series introduced hashes, encryption/decryption, digital signatures, and digital certificates through the OpenSSL libraries and command-line utilities. This second article drills down into the details. Let’s begin with hashes, which are ubiquitous in computing, and consider what makes a hash function cryptographic.