Category: privacy

Link: OpenVPN-Setup: Shell script to set up Raspberry Pi (TM) as an OpenVPN server

About

Shell script to set up Raspberry Pi (TM) as a VPN server using the free, open-source OpenVPN software. Includes templates of the necessary configuration files for easy editing, as well as a script for easily generating client .ovpn profiles after setting up the server. Based on the ReadWrite tutorial ‘Building A Raspberry Pi VPN’ by Lauren Orsini (see sources 1 and 2 at the bottom of this Readme).

To follow this guide, you will need to have a Raspberry Pi Model B or later (so long as it has an ethernet port), an SD or microSD card (depending on the model) with Raspbian installed, a power adapter appropriate to the power needs of your model, and an ethernet cable to connect your Pi to your router or gateway. You will also need to setup your Pi with a static IP address (see either source 3 or 4) and have your router forward port 1194 (varies by model & manufacturer; consult your router manufacturer’s documentation to do this). You should also find your Pi’s local IP address on your network and the public IP address of your network and write them down before beginning. Enabling SSH on your Pi is also highly recommended, so that you can run a very compact headless server without a monitor or keyboard and be able to access it even more conveniently (This is also covered by source 4). And last but not least, be sure to change your user password from the default.

Full documentation and download here:
OpenVPN-Setup (GitHub)
Discussion in this Reddit thread

Link: 4 Tools to Securely Delete Files from Linux

Any computer user with normal level skill set knows that any data removed from computer system can be recovered later with little bit of efforts. This is a good thing in the scenario when you have accidentally deleted your critical data. But in most cases, you don’t want your private data to be recovered easily. Whenever we remove anything, the operating system deletes just the index of the particular data. It means that data is still there somewhere on the disk, this method is insecure, as any smart computer hacker can use any good data recovery tool to easily recover your deleted data. Linux users utilizes the well know “rm” command to remove data from their operating system, but “rm” command works in the conventional fashion. Data removed using this command can be recovered by special file recovery tools.

Let’s see how we can safely and completely remove files/folders from our Linux system. The methods mentioned below remove data completely so it becomes very hard for recovery tools to find traces of the actual data and recover it.

Full article here:
4 Tools to Securely Delete Files from Linux (LinOxide)

Link: Understanding Linux File Permissions

The Unix operating system (and likewise, Linux) differs from other computing environments in that it is not only amultitasking system but it is also a multi-user system as well.

…..

In order to make this practical, a method had to be devised to protect the users from each other. After all, you could not allow the actions of one user to crash the computer, nor could you allow one user to interfere with the files belonging to another user.

This lesson will cover the following commands:

  • chmod – modify file access rights
  • su – temporarily become the superuser
  • chown – change file ownership
  • chgrp – change a file’s group ownership

Full article here:
Understanding Linux File Permissions (Project: Fenix)

Link: How to Create YouTube Playlists without Logging In

There’s however a simple URL hack that will let you create “virtual” playlists on YouTube – they are like regular playlists except that they are not connected to any Google account and you can still add or remove videos on the fly.

Full article here:
How to Create YouTube Playlists without Logging In (Digital Inspiration)

Link: How to Block Ads on Adblock Plus Paid Whitelist

Adblock Plus is a widely used free browser add-on for controlling the ads shown on web pages. For some time the add-on has employed a whitelist that allows certain kinds of ads to pass through and to be displayed. Google has previously been reported to be paying to get its ads displayed. Now, it has just been reported that a number of large companies such as Microsoft are also paying to be whitelisted. However, the paid whitelist can be circumvented. Here is how to configure three common browsers to block ads that are whitelisted by Adblock Plus.

Full article here:
How to Block Ads on Adblock Plus Paid Whitelist (Gizmo’s Freeware)

Link: 10 SCP Commands to Transfer Files/Folders in Linux

Linux administrator should be familiar with CLI environment. Since GUI mode in Linux servers is not a common to be installed. SSH may the most popular protocol to enable Linux administrator to manage the servers via remote in secure way. Built-in with SSH command there is SCP command. SCP is used to copy file(s) between servers in secure way.

Full article here:
10 SCP Commands to Transfer Files/Folders in Linux (Tecmint)

Link: How To Disable Unity Online Search Feature On Ubuntu 14.10

What Is Unity Online Search Feature?

The Unity search function in Ubuntu operating system is provided by Canonical Ltd. When you enter a search term into the dash, Ubuntu will search your computer and will record the search terms locally. Unless you have opted out, the search terms will be sent to productsearch.ubuntu.com link and selected third parties including Facebook, Twitter, BBC, and Amazon. Canonical and these selected third parties will collect your search terms and use them to provide you with search results while using Ubuntu.

Full article here:
How To Disable Unity Online Search Feature On Ubuntu 14.10 (Unixmen)

Link: Spotlight: Privacy Advocates Furious As Apple Feature Siphons Off Location Data of Yosemite And iOS 8 Users

The privacy world is peeved at Apple again. It’s emerged that anyone who uses the Spotlight feature in either Mac OS X Yosemite or iOS 8 will have their location and search data passed to Apple servers. The same data will also be sent to Microsoft …..

Full article here:
Spotlight: Privacy Advocates Furious As Apple Feature Siphons Off Location Data of Yosemite And iOS 8 Users (Forbes)
Related:
Apple’s Mac computers can automatically collect your location information (Washington Post)
How to Stop Apple From Snooping on Your OS X Yosemite Searches (Wired)
fix macosx

Link: 8 Cool Ways To Use SCP

The SCP protocol is a network protocol, based on the BSD RCP protocol, which supports file transfers between hosts on a network. SCP uses Secure Shell (SSH) for data transfer and utilizes the same mechanisms for authentication, thereby ensuring the authenticity and confidentiality of the data in transit. A client can send (upload) files to a server, optionally including their basic attributes (permissions, timestamps). Clients can also request files or directories from a server (download). SCP runs over TCP port 22 by default. Like RCP, there is no RFC that defines the specifics of the protocol.

SCP is an awesome tool. Learn it, Love it, Use it….

Full article here:
8 Cool Ways To Use SCP (UrFix’s Blog)

Link: How To Setup a VPN in Ubuntu using OpenVPN

We love Linux and we love it for its open source nature, security, and powerful tools. There are a lot of free as well as commercial VPN solutions available for Ubuntu. We are not going to list or rank all the top VPN providers. We don’t necessarily want to rank them simply because users choose their VPN provider based on their personal requirements. If you want an US VPN service, you should look for the best US VPN service that supports OpenVPN. The intent of the article is to help newbies configure and use their favorite VPN service without going back and forth in Ubuntu community forum and embarrass oneself before the rather patronizing users.

Full article here:
How To Setup a VPN in Ubuntu using OpenVPN (Linuxaria)

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez