Category: privacy

Probably more than you ever wanted to know about how to protect your privacy online

There are people who don’t do enough to protect their privacy online (like those who use the exact same password for every site they visit) and then there are the people who are ultra-concerned about protecting their privacy and covering their tracks online. This article is clearly intended for the latter group.

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

Source: privacy tools – encryption against global mass surveillance 🔒

Contribute Anonymously To Git Repositories Over Tor With Gitnonymous Project

With gitnonymous project, now you can obfuscate your true identity when making Git commits and pushing to public repositories. 

Source: Contribute Anonymously To Git Repositories Over Tor With Gitnonymous Project (fossBytes)

Disposable Email Addresses: What You Need to Know 

Finding spam in your Inbox is nothing new. Luckily, there are solutions (disposable email addresses) to the spam problem that we’ll show you in this article

Source: Disposable Email Addresses:What You Need to Know  (Make Tech Easier)

Vizio smart televisions are secretly watching owners, here’s how to stop it

Vizio brand smart TV feature secretly spy on owners’ viewing habits and share the information with advertisers.

Source: Vizio smart televisions are secretly watching owners, here’s how to stop it (International Business Times UK)

How to set up your own Raspberry Pi powered VPN – BBC News

BBC Click’s Kate Russell gives a step-by-step guide to setting up your own virtual private network using a Raspberry Pi.

Source: How to set up your own Raspberry Pi powered VPN – BBC News

Link: Hola VPN Sells Users’ Bandwidth, Founder Confirms

The operator of 8chan says the bandwidth of millions of Hola users is being sold for reuse, with some of it even being used to attack his site. Speaking with TorrentFreak, Hola founder Ofer Vilenski says that users’ idle resources are indeed utilized for commercial sale, but that has been the agreement all along.

I don’t endorse the use of this type of service in the first place, but since I know that many people use services such as this to bypass geographic restrictions on content, I think that you should know what you are getting into if you use this particular service.

Full article here:
Hola VPN Sells Users’ Bandwidth, Founder Confirms

Link: How to access a Linux server behind NAT via reverse SSH tunnel

You are running a Linux server at home, which is behind a NAT router or restrictive firewall. Now you want to SSH to the home server while you are away from home. How would you set that up? SSH port forwarding will certainly be an option. However, port forwarding can become tricky if you are dealing with multiple nested NAT environment. Besides, it can be interfered with under various ISP-specific conditions, such as restrictive ISP firewalls which block forwarded ports, or carrier-grade NAT which shares IPv4 addresses among users.

What is Reverse SSH Tunneling?

One alternative to SSH port forwarding is reverse SSH tunneling. …..

Full article here:
How to access a Linux server behind NAT via reverse SSH tunnel (Xmodulo)

Link: Access Google Authenticator on the Desktop

No longer are you limited to using your smartphone to use Google’s two-step authentication. There are many apps that you can use easily on your desktop to help keep your accounts more secure.

Keep in mind, though, that using a two-step authenticator app is less secure on your computer. Anyone who has access to your desktop can get your security key and log into your account. But if you don’t own a smartphone, using a program on your computer is better than nothing.

To use any of these apps to secure your accounts, you need to make sure you go through the usual process to enable two-factor authentication on Google or activate any other services that need two-factor authentication. Instead of entering the key into a mobile app, all you do is to enter it on your desktop.

Full article here:
Access Google Authenticator on the Desktop (Make Tech Easier)

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez