How to strengthen my privacy
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
This guide explains VPN installation and configuration processes on Linux systems. We demonstrate these processes for OpenVPN, ProtonVPN, and NordVPN.
Here's a step-by-step guide to installing the WireGuard VPN on Windows, MacOS, Linux, iOS, and Android.
Hashcat is for those who are in the computer security field and want to test the strength of the password to perform security audits. In short, it is an advanced password recovery tool that supports various hashing algorithms with extensive options for password cracking.
Bitwarden is a password manager that offers both SAAS service and the opportunity for admins to create their own password manager server using the open-source Bitwarden server. Whereas to manage, save and sync passwords from the local system, it also offers client applications.
Private VPNs give you greater control and privacy, but how do you set one up? Here's how to use the free TurnKey GNU/Linux to create your own VPN.
If your Arch Linux computer supports Bluetooth but you’re not using it, it’ll just be wasting power. Instead of turning it off whenever you boot your computer, disable the Bluetooth service instead.
If you want the highest level of privacy and security with your web browser, you should be using Tor.
If you need to allow others to access your Ubuntu desktop, you might consider enabling the Guest Session feature. This way, those users don't have access to your data.
Today, we are going to see how to encrypt and decrypt files from command line in Linux using a free utility named GNU Privacy Guard (shortly GPG or GnuPG).
If you're a webmaster and want a privacy-friendly way to monitor your website traffic, consider using GoAccess on your Linux server.
We already posted a brief guide about - how to generate a strong password in Linux a while ago. Now, we are going to find out if the generated password is really strong or not. In this short tutorial, we will see how to check the password complexity in Linux from commandline.
Fingerprint authentication is more secure than traditional password-based authentication. Here's how to set up a fingerprint login on Ubuntu.
GPG is software that is generally seen as difficult to use because it was used by typically tech-savvy people in the past. However, in recent years, especially when privacy concerns are on the rise, GPG has become an easy-to-use piece of software for computer users of all levels. It's even easier now to create your own GPG key.
The fingerprint is one of the most common entries for authorization. The use of biometric data for authorization confirms the physical existence of individuals by using an element that is relatively inseparable from them.
The modern user is a privacy conscious one. We want to know what data is being collected and how it’s being used. For Linux users, we embody this mindset ten-fold. Portmaster gives you more control over your data.
If you want to log in to your Linux desktop automatically after boot, consider enabling the auto-login feature on Linux Mint.
Here's how easy it is to add a layer of security to your secure shell logins on Linux.
All files contain some additional information about the data stored in them, also known as metadata. Here's how to remove file metadata on Linux.
If you've any personal or sensitive files stored on your Linux machine, you should consider encrypting them with GnuPG for added security.
Shell scripts can save you time and effort, but if you don't protect your passwords, they can be a liability. Here's how to stay safe.