A firewall alias is a powerful feature which should not be overlooked
OpenVPN is a service to host your own VPN server, without using third-party servers.
A VPN is a secured connection between two networks, for example between your phone and your home.
In this tutorial, I’ll give you a step-by-step method to install it quickly on Raspberry Pi.
Sandboxing is a computer security technique that focuses on isolating a program or process from parts of a system that it does not need to interact with during normal operation. In this tutorial you will run through a practical demonstration of how to use systemd’s sandboxing techniques on Ubuntu 20.04 for an efficient workflow to implement and to test these techniques. Any process that runs on a Linux system that uses systemd can be made more secure with these techniques.
Switching from your ISP’s offering to a custom DNS server can be beneficial. As many have experienced, these public DNS servers from the house of Google, Cisco, and others offer much better performance in terms of latency and features. ….. So, if you’re looking for some good custom DNS servers, here we have compiled a list of the most popular and reliable public DNS servers in the market.
Source: 5 Best DNS Servers (2020) – Free Public DNS For Speedy Connections (Fossbytes)
Bypass URLs that make you wait, do something or track you with this browser extension.
With a little time and energy, anyone can build a little computer that kills advertisements and makes browsing more manageable.
In this article, I’ll be sharing and documenting what I’ve learned during a recent situation where I had to install, setup, and configure ClamAV to run on Ubuntu 18.04 systems using real-time or as ClamAV calls it “on-access scanning”.
Source: Installation & Configuration of ClamAV Antivirus on Ubuntu 18.04 (Aaron Brighton)
This post includes SCP examples. SCP or secure copy allows secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication and security as the Secure Shell (SSH) protocol from which it is based. SCP is loved for it’s simplicity, security and pre-installed availability.
Source: SCP Linux – Securely Copy Files Using SCP examples (Hayden James)
Cybersecurity researchers crack the codes of FortuneCrypt, Yatron, WannaCryFake and Avest ransomware, allowing victims to get their files back without paying cyber criminals.
This tutorial shows how to check open ports on your Linux system. This very helpful for troubleshooting to see if the port is use or not.
Source: How to Check Open Ports in Linux (LinOxide)