How To Strengthen My Privacy - Page 2.8

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Strengthen My Privacy HOWTOs

How To Install Tor Browser On Ubuntu Linux?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Sure Linux is the most secure OS out there, but can we trust third-party apps and your Internet Service Provider? Definitely not." Learn how to install the Tor browser on Ubuntu Linux to protect your privacy online and gain full control of your data in this Fossbytes tutorial.

How to set up Wireguard VPN on CentOS 8

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireguard is an open-source cross-platform VPN implementation that uses state of the art cryptography and provides faster, simpler and more functional VPN tunneling than the IPSec and OpenVPN protocols. Learn how to set up Wireguard on CentOS 8 in this HowtoForge tutorial.

How to Set Up WireGuard VPN on Ubuntu 20.04

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Learn how to set up WireGuard VPN - an innovative VPN (Virtual Private Network) technology that utilizes state-of-the-art cryptography - on Ubuntu 20.04 to act as a VPN server. This setup can be used to surf the web anonymously, bypass Geo-restricted content, allow remote workers to connect to a corpoarte network securely and protect against Man in the Middle attacks.

Check your password security with Have I Been Pwned? and pass

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Password security involves a broad set of practices, and not all of them are appropriate or possible for everyone. Therefore, the best strategy is to develop a threat model by thinking through your most significant risks—who and what you are protecting against—then model your security approach on the activities that are most effective against those specific threats. The Electronic Frontier Foundation (EFF) has a great series on threat modeling that I encourage everyone to read.

How to use OpenSSL: Hashes, digital signatures, and more

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first article in this series introduced hashes, encryption/decryption, digital signatures, and digital certificates through the OpenSSL libraries and command-line utilities. This second article drills down into the details. Let’s begin with hashes, which are ubiquitous in computing, and consider what makes a hash function cryptographic.

How to Change User Password in Ubuntu

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this short quick article, we will show you how to change a user password in Ubuntu Linux using the graphical interface as well as the command line interface. As you are well aware, most operations on Ubuntu are applicable to its derivatives such as Linux Mint, Xubuntu, Lubuntu, and many others.

Assume breach is for losers: These steps will stop data breaches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by a dedicated attacker. There is a lot of validity to this approach. Most companies and organizations are super easy to hack and compromise. However, it doesn’t have to be this way.

Securing privacy with Mycroft, an Open AI voice assistant

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Voice-assisted technologies are extremely popular; already there are2.5 billionsuch devices in use and that's expected to triple to 8 billion by 2023. This growth appears to be unstoppable—despite theprivacy and security vulnerabilitiesin mainstream voice-assisted technology.

OS Tool of the Month: Gnu Privacy Guard (GnuPG) Mini Howto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Originall written in 2004, here you will find one of the most extensive HowTo's available for GnuPG. It truly is a 'soup to nuts' overview. This documents explains how to use the GNU Privacy Guard (GnuPG), an Open Source OpenPGP compatible encryption system. To keep this program totally free the use of the RSA algorithm and other patented algorithm has been avoided. The document was originally written by Michael Fischer v. Mollar in German.