Category: Security

Enpass Is The Free Cross-Platform Password Manager

Previously we covered KeePassXC password manager which is also free application. Here comes another password manager called Enpass, it is free and cross-platform available for Linux, Windows, Mac, Android, Blackberry, Windows Phone and iOS.

Source: Enpass Is The Free Cross-Platform Password Manager (NoobsLab)

The Ultimate Firefox Privacy & Security Guide

Online privacy and security are constantly under assault. It seems like every day there’s a new threat to your personal information. Choosing and configuring the right web browser goes a long way in protecting yourself. Right now Firefox is the best option for that. It’s open source, gives you tons of options for control, and has all of the privacy and security add-ons you’ll need.

This guide is as complete as it can be at the time of writing. These are ever-evolving topics, and threats continue to change. Regardless, this guide will give you a good basis to protect yourself from common threats.

Source: The Ultimate Firefox Privacy & Security Guide – Make Tech Easier

How to Block Bad Websites

With the amount of malware currently prowling the internet it’s becoming increasingly important to protect your computer. Therefore I’ve separated my advice on how to stay safe online into two main sections. The first is the methods that I believe anyone from a novice to an expert user can use. The other section is aimed more at intermediate to advanced users. These methods may be more difficult to use, but your computer will be more secure.  

Source: How to Block Bad Websites | Gizmo’s Freeware

Keep local Instant Messages on your local network with BeeBEEP (Secure Lan Messenger)

When you want to send an instant message to someone else that’s on the same local network as you are, whether that be another family member or a co-worker in your office, why use an offsite chat server that leaves your messages open to interception by the company running the chat server or some other third party? This software will allow you to keep your local IM’s in your local network, and for added safety it also encrypts them! Plus, it supports multiple operating systems, unlike the proprietary chat client that might have come with your computer. It’s NOT for chatting with people elsewhere on the internet; if you need to set up secure connections with offsite chat clients then you may need to set up a private Prosody IM server. But for secure IM chats with people on your local network, this looks like just the thing!

What is BeeBEEP?

BeeBEEP is an open source, peer to peer, lan messenger developed by Marco Mastroddi. You can talk and share files with all the people inside your local area network such of an office, home or internet cafe. You don’t need a server, just download, unzip and start it. Simple, fast and secure.

Main Features:

  • Free: BeeBEEP is free and always will be.
  • Multiple OS: there are releases for Windows, MacOSX, Linux, OS/2 and eComStation.
  • Easy to use: BeeBEEP is a serverless application. Download, unzip and start.
  • Secure: encryption based on Rijndael Algorithm (AES).
  • Instant Messaging: chat with all people connected, group or single user.
  • Groups: create your favorite group of people.
  • P2P: send or share your files and folders (also by drag and drop).
  • Offline messages: messages will be delivered to offline users when they will be online.
  • Message History: all messages can be saved.
  • Source: BeeBEEP (Secure Lan Messenger)

    Linux iptables Firewall Simplified Examples

    In the previous post, we’ve talked about how to Secure Linux Server Using Hardening Best Practices and some people ask me about firewall section which was a brief introduction about iptables firewall. Today we will discuss in detail the Linux iptables firewall and how to secure our servers traffic using that awesome tool.

    Source: Linux iptables Firewall Simplified Examples – Like Geeks

    Detect Webcam & Microphone Activity on Mac with Oversight

    Though Mac users don’t usually have to worry excessively about “camfecting” malware and spyware, some security conscious users may find it nice to know if a process or application is attempting to access their computers web camera or microphone.

    Source: Detect Webcam & Microphone Activity on Mac with Oversight

    Raspberry Pi as a SOCKS proxy and SSH file server Tutorial

    A couple redditors showed interest in how I set up my Pi as a SOCKS proxy and recommended I make a separate post as a tutorial, so I’ll do my best to explain everything.

    Background

    SOCKS stands for Socket Secure, and is essentially just a middle man for a server and client for send information between. The best description I’ve heard of it is “It’s a poor man’s VPN.” It essentially works the same, but each service has to be configured to work with it (i.e. I have Firefox on my Mac working through my SOCKS proxy but not Chrome and Safari). Why would you want a SOCKS proxy over a VPN? From my experience, it runs better on a Pi, and I can also do multiple things over SSH (such as also run a file server). Having to configure each service to run through it can also be a pro or a con, depending on if you want everything to work through it or not.

    Basic Overview

    There’s really not much to setting everything up; it’s a pretty straightforward process. For those just looking for something short and sweet, here are the basic steps I followed. I’ll go over each more in depth below.

    Source: RPi as a SOCKS proxy and SSH file server Tutorial (Reddit/Raspberry Pi)

    How to Improve the Security of Your Linux System with Firejail

    If you are looking to improve the security of your Linux system, check out Firejail that can sandbox all processes and reduce the risk of security breaches

    Source: How to Improve the Security of Your Linux System with Firejail – Make Tech Easier

    Before You Pay that Ransomware Demand…

    A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind. Five years ago you were more likely to get whacked by a banking trojan that stole all your passwords and credit card numbers. These days if your mobile or desktop computer is infected what gets installed is likely to be “ransomware” — malicious software that locks your most prized documents, songs and pictures with strong encryption and then requires you to pay for a key to unlock the files.

    Here’s some basic advice about where to go, what to do — and what not to do — when you or someone you know gets hit with ransomware.

    Source: Before You Pay that Ransomware Demand… — Krebs on Security

    The Differences between Su, Sudo Su, Sudo -s and Sudo -i

    In Linux, there are several ways to switch to the root user and it can be confusing. Learn the differences between each command and their use cases.

    Source: The Differences between Su, Sudo Su, Sudo -s and Sudo -i (Make Tech Easier)

    Featured Article:

    Recent Posts

    Recent Comments

    Archives

    Categories

    Meta

    GiottoPress by Enrique Chavez

    %d bloggers like this: