This post includes SCP examples. SCP or secure copy allows secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication and security as the Secure Shell (SSH) protocol from which it is based. SCP is loved for it’s simplicity, security and pre-installed availability.
Source: SCP Linux – Securely Copy Files Using SCP examples (Hayden James)
We’ve used Etcher several times, mostly to make a bootable SD card for a Raspberry Pi or to put a bootable image of a Linux distribution onto a USB thumb drive. But we’re rethinking that now because we’ve read some concerns about privacy when using Etcher, or balenaEtcher as it is now called. … All we wanted to point out is that if you do have any concerns about using Etcher or balenaEtcher, there are alternatives, depending on which operating system you are using:
Source: If you have privacy concerns regarding Etcher (now known as balenaEtcher), here are some alternatives – Two “Sort Of” Tech Guys
Introduction The scp command is used to copy files and directories between one computer to another. What is valuable about this utility is the fact that it used ssh to tunnel the copying. This means that the data is encrypted because it rides on ssh’s secure features.
Source: How to use scp command to securely transfer files with examples – Computing for Geeks
A VPN (Virtual Private Network) protects your privacy by routing all your Internet traffic through an encrypted server that your ISP (or hackers) can’t see. Setting up and using a log-free VPN service from your PC desktop is straightforward enough, but other devices in your home such as your game console and set-top box don’t let you install VPN software.
One solution is to buy a router that can connect directly to a VPN service, protecting all the traffic on your home network a single stroke. But it could be cheaper (and simpler) just to route all your traffic through a Raspberry Pi that remains connected to the VPN at all times.
Source: How to Use Raspberry Pi as a VPN Gateway – Tom’s Hardware
Here are two pages to visit to safeguard your privacy when using Firefox. Please BE CAREFUL when making changes such as these; you probably do not want to make every single change shown because if you do, you may experience unintended consequences, and may possibly even “break” certain web sites:
1. Firefox Privacy – The Complete How-To Guide
Mozilla Firefox is arguably the best browser available that combines strong privacy protection features, good security, active development, and regular updates. The newest version of Firefox is fast, light-weight, and packed full of great settings to protect your privacy.
It is for this reason that I consider Firefox to be the best all-around browser for privacy and security. It remains a solid alternative to some of the other options, such as Google Chrome, Microsoft Edge, and Safari.
Another great aspect of Firefox is that it is highly customizable, which is the point of this guide. Below we will go over how you can customize Firefox to give you the security and privacy you desire, while still working well for day-to-day browsing.
Source: Firefox Privacy – The Complete How-To Guide (Restore Privacy)
2. Privacy/Privacy Task Force/firefox about config privacy tweeks
Firefox: Privacy Related “about:config” Tweaks
This is a collection of privacy related about:config tweaks. We’ll show you how to enhance the privacy of your Firefox browser.
Source: Privacy/Privacy Task Force/firefox about config privacy tweeks (Mozilla Wiki)
SSH-key-based authentication provides a more secure alternative to password-based authentication. In this tutorial we’ll learn how to set up SSH key-based authentication on a Debian 9 installation.
Source: How to Set Up SSH Keys on Debian 9 | DigitalOcean
OpenVPN is a full-featured, open-source Secure Socket Layer (SSL) VPN solution that accommodates a wide range of configurations. In this tutorial, you will set up an OpenVPN server on an Ubuntu 18.04 server and then configure access to it from Windows, macOS, iOS and/or Android. This tutorial will keep the installation and configuration steps as simple as possible for each of these setups.
Source: How To Set Up an OpenVPN Server on Ubuntu 18.04 | DigitalOcean
Trace is a browser add-on/extension for Firefox and Chrome that blocks multiple tracking techniques used by many websites.
Source: This Chrome/Firefox Add-on Lets You Leave Almost No Trace Browsing Online | Gizmo’s Freeware
What is Secure Copy?
scp allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh.
Source: Example syntax for Secure Copy (scp) (hypexr.org)
Flushing your DNS cache can help to fix host connection problems you may experience when accessing some web pages. To get a better Internet access performance, Google built a caching system, not only for site content but DNS as well. So yes, Google Chrome does have a built-in internal DNS caching system – a hidden feature that allows users to manually clear out the Chrome DNS host cache from within the browser itself.
Flushing out the Chrome DNS cache can prove useful, especially when you have changed the DNS settings. If clearing out the DNS cache from the operating system level does not fix the host connection problems, clearing up Chrome’s own DNS cache should do the trick.
This article will show you step by step how to clear the Chrome DNS cache.
Source: How to Clear the Google Chrome DNS Cache – Make Tech Easier