Below you’ll find 2 tools that make it easy to use free OpenVPN servers from VPN Gate in Linux.In case you’re not familiar with VPN Gate, this is project that offers free VPN servers that are ran by volunteers who use SoftEther. It was designed with the Great Firewall of China in Mind and is sponsored by the University of Tsukuba, Japan.
A couple redditors showed interest in how I set up my Pi as a SOCKS proxy and recommended I make a separate post as a tutorial, so I’ll do my best to explain everything.
SOCKS stands for Socket Secure, and is essentially just a middle man for a server and client for send information between. The best description I’ve heard of it is “It’s a poor man’s VPN.” It essentially works the same, but each service has to be configured to work with it (i.e. I have Firefox on my Mac working through my SOCKS proxy but not Chrome and Safari). Why would you want a SOCKS proxy over a VPN? From my experience, it runs better on a Pi, and I can also do multiple things over SSH (such as also run a file server). Having to configure each service to run through it can also be a pro or a con, depending on if you want everything to work through it or not.
There’s really not much to setting everything up; it’s a pretty straightforward process. For those just looking for something short and sweet, here are the basic steps I followed. I’ll go over each more in depth below.
Source: RPi as a SOCKS proxy and SSH file server Tutorial (Reddit/Raspberry Pi)
It is a known issue that a hacker access the webcam and mic on your device without your consent and awareness. You can take the help of a tape but it can’t be considered a wise solution. An ex-NSA hacker has created an anti spying tool for OS X which alerts you when an application tries to access the FaceTime camera and mic.
Deleting your files isn’t good enough. Not even if you empty the recycle bin afterwards. Nor is formatting the drive. There are plenty of ways to recover data in such circumstances. Instead, you need a specialist program that can wipe the entire drive by storing random data onto every part of it, multiple times.
There are many password managers for Windows and OS X, but here we’ll look at some of the best password managers for Linux. With so many online accounts on the internet, it can be tediously difficult to remember all your passwords. Many people write them down or store them in a document, but that’s plain insecure.
Source: 10 Best Password Managers For Linux Operating Systems (Fossbytes)
With plenty of password managers out there, it can be difficult to choose the best one for you. Here is a list comparing free password managers.
Source: Free Password Managers Compared: Which One is the Best for you? (Make Tech Easier)
Many Mac users running a modern version of OS X El Capitan have noticed the Secure Erase Free Space feature has gone missing from Disk Utility. What the “Erase Free Space” feature did (and still does in prior versions of Mac OS X) was overwrite the free space on a drive to prevent file recovery, adding a layer of security and privacy to file removal, much in the way that Secure Empty Trash performed a similar function of overwriting data after removal.
Source: How to Secure Erase Free Space on Mac Drives with OS X El Capitan (OS X Daily)
Last week, Opera added a VPN to the dev version of its browser, which was certainly good news. The bad news is that unlike the more robust VPNs it tries to replace, it leaks data that should be encrypted all over the place, namely your private IP address. Here’s how to fix it.
Source: Stop Opera’s New VPN from Leaking Your IP Address (Lifehacker)
In this tutorial, I will explain how to use Let’s Encrypt to obtain a free SSL certificate and use it with Nginx on Ubuntu or Debian Linux.
Staying anonymous on the Internet might not necessarily mean the same as surfing the web safely but rather keeping yourself safe from prying eyes that may otherwise take advantage of the vulnerability of your system thereby exposing you and your data for whomever might just be up for the grabbing – especially some hacker snooping around for sensitive data to hoard (particularly if you’re being targeted) and use for otherwise evil purposes that can have some serious effects on the violated individual.
However, for whatever reason you might want to remain anonymous or unidentifiable (if you may) on the net, in this article is our pick of tools that will help you achieve your purpose effectively without the risks that usually come with surfing the Internet unprotected.
Source: Top 5 Best Security-Centric Linux Distributions Of 2016 (Tecmint)