Category Archive: Security

Apr 25 2017

How to Block Bad Websites | Gizmo’s Freeware

With the amount of malware currently prowling the internet it’s becoming increasingly important to protect your computer. Therefore I’ve separated my advice on how to stay safe online into two main sections. The first is the methods that I believe anyone from a novice to an expert user can use. The other section is aimed …

Continue reading »

Apr 19 2017

Keep local Instant Messages on your local network with BeeBEEP (Secure Lan Messenger)

When you want to send an instant message to someone else that’s on the same local network as you are, whether that be another family member or a co-worker in your office, why use an offsite chat server that leaves your messages open to interception by the company running the chat server or some other …

Continue reading »

Mar 11 2017

Linux iptables Firewall Simplified Examples

In the previous post, we’ve talked about how to Secure Linux Server Using Hardening Best Practices and some people ask me about firewall section which was a brief introduction about iptables firewall. Today we will discuss in detail the Linux iptables firewall and how to secure our servers traffic using that awesome tool. Source: Linux …

Continue reading »

Feb 27 2017

Detect Webcam & Microphone Activity on Mac with Oversight

Though Mac users don’t usually have to worry excessively about “camfecting” malware and spyware, some security conscious users may find it nice to know if a process or application is attempting to access their computers web camera or microphone. Source: Detect Webcam & Microphone Activity on Mac with Oversight

Jan 04 2017

Raspberry Pi as a SOCKS proxy and SSH file server Tutorial

A couple redditors showed interest in how I set up my Pi as a SOCKS proxy and recommended I make a separate post as a tutorial, so I’ll do my best to explain everything. Background SOCKS stands for Socket Secure, and is essentially just a middle man for a server and client for send information …

Continue reading »

Dec 30 2016

How to Improve the Security of Your Linux System with Firejail

If you are looking to improve the security of your Linux system, check out Firejail that can sandbox all processes and reduce the risk of security breaches Source: How to Improve the Security of Your Linux System with Firejail – Make Tech Easier

Dec 26 2016

Before You Pay that Ransomware Demand… — Krebs on Security

A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind. Five years ago you were more likely to get whacked by a banking trojan that stole all your passwords and credit card numbers. These days if your mobile or desktop computer is …

Continue reading »

Nov 17 2016

The Differences between Su, Sudo Su, Sudo -s and Sudo -i

In Linux, there are several ways to switch to the root user and it can be confusing. Learn the differences between each command and their use cases. Source: The Differences between Su, Sudo Su, Sudo -s and Sudo -i (Make Tech Easier)

Oct 10 2016

[OS X] Don’t Put Tape On Your Webcam, This Free App Alerts You When Someone Hacks It

It is a known issue that a hacker access the webcam and mic on your device without your consent and awareness. You can take the help of a tape but it can’t be considered a wise solution. An ex-NSA hacker has created an anti spying tool for OS X which alerts you when an application …

Continue reading »

Oct 08 2016

Disposing Of A PC? Nuke The Drive First. | Gizmo’s Freeware

Deleting your files isn’t good enough. Not even if you empty the recycle bin afterwards. Nor is formatting the drive. There are plenty of ways to recover data in such circumstances. Instead, you need a specialist program that can wipe the entire drive by storing random data onto every part of it, multiple times. Source: …

Continue reading »

Older posts «

%d bloggers like this: