How to strengthen my privacy

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Strengthen My Privacy HOWTOs

How To Safeguard Online Privacy & Anonymity with Tails OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Tails (The Amnesic Incognito Live System) is a free and open-source operating system that prioritizes online privacy and anonymity. Key features and functionalities of Tails include its privacy-focused nature, its ability to leave no trace on the computer's hard drive, and its integration with the Tor network.

How to install Hashcat on Ubuntu 22.04 | 20.04 LTS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hashcat is for those who are in the computer security field and want to test the strength of the password to perform security audits. In short, it is an advanced password recovery tool that supports various hashing algorithms with extensive options for password cracking.

2 Ways to install Bitwarden on Debian 12 or 11 Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bitwarden is a password manager that offers both SAAS service and the opportunity for admins to create their own password manager server using the open-source Bitwarden server. Whereas to manage, save and sync passwords from the local system, it also offers client applications.

How to Disable Bluetooth on Arch Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If your Arch Linux computer supports Bluetooth but you’re not using it, it’ll just be wasting power. Instead of turning it off whenever you boot your computer, disable the Bluetooth service instead.

How To Check The Password Complexity In Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We already posted a brief guide about - how to generate a strong password in Linux a while ago. Now, we are going to find out if the generated password is really strong or not. In this short tutorial, we will see how to check the password complexity in Linux from commandline.

How to Generate Your Own GnuPG Key

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

GPG is software that is generally seen as difficult to use because it was used by typically tech-savvy people in the past. However, in recent years, especially when privacy concerns are on the rise, GPG has become an easy-to-use piece of software for computer users of all levels. It's even easier now to create your own GPG key.

How to Install Portmaster in Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The modern user is a privacy conscious one. We want to know what data is being collected and how it’s being used. For Linux users, we embody this mindset ten-fold. Portmaster gives you more control over your data.