Installation & Configuration of ClamAV Antivirus on Ubuntu 18.04 (with On-Access Scanning)

In this article, I’ll be sharing and documenting what I’ve learned during a recent situation where I had to install, setup, and configure ClamAV to run on Ubuntu 18.04 systems using real-time or as ClamAV calls it “on-access scanning”.

Source: Installation & Configuration of ClamAV Antivirus on Ubuntu 18.04 (Aaron Brighton)

SCP Linux – Securely Copy Files Using SCP examples

This post includes SCP examples. SCP or secure copy allows secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication and security as the Secure Shell (SSH) protocol from which it is based. SCP is loved for it’s simplicity, security and pre-installed availability.

Source: SCP Linux – Securely Copy Files Using SCP examples (Hayden James)

Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for free

Cybersecurity researchers crack the codes of FortuneCrypt, Yatron, WannaCryFake and Avest ransomware, allowing victims to get their files back without paying cyber criminals.

Source: Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for free | ZDNet

How to Check Open Ports in Linux

This tutorial shows how to check open ports on your Linux system. This very helpful for troubleshooting to see if the port is use or not.

Source: How to Check Open Ports in Linux (LinOxide)

How to use scp command to securely transfer files with examples

Introduction The scp command is used to copy files and directories between one computer to another. What is valuable about this utility is the fact that it used ssh to tunnel the copying. This means that the data is encrypted because it rides on ssh’s secure features.

Source: How to use scp command to securely transfer files with examples – Computing for Geeks

How to Set Up SSH Keys on Debian 9

SSH-key-based authentication provides a more secure alternative to password-based authentication. In this tutorial we’ll learn how to set up SSH key-based authentication on a Debian 9 installation.

Source: How to Set Up SSH Keys on Debian 9 | DigitalOcean

This Chrome/Firefox Add-on Lets You Leave Almost No Trace Browsing Online

Trace is a browser add-on/extension for Firefox and Chrome that blocks multiple tracking techniques used by many websites.

Source: This Chrome/Firefox Add-on Lets You Leave Almost No Trace Browsing Online | Gizmo’s Freeware

Cronopete – An Apple Time Machine Clone For Linux

If you use Mac OS, you certainly have known about or used Time machine. It is a backup software application distributed with the Apple’s Mac OS X. It is used to backup your data to an external drive, so that you can restore them later from the backup. If you are a fan boy/girl of Time Machine, you need to check out “Cronopete”. It is the clone of Time Machine for Linux operating systems. Using Cronopete, we can easily create periodic backups of a Linux system. It supports popular Linux distributions, including Arch Linux, Debian, Fedora, and Ubuntu.

In this brief guide, we are going to see how to install and use Cronopete in Linux to backup and restore data.

Source: Cronopete – An Apple’s Time Machine Clone For Linux – OSTechNix
Related link: Easy Linux backup software with Time Machine like functionality | Nuxified.org

Read-only Raspberry Pi script: how to secure a micro SD card so nothing can be written to it

If you’ve ever built a Pi for a kiosk, installation or information display, you’ll find Adafruit’s read-only Pi script invaluable. This script disables all the write-to-SD-card functions, meaning that you can pull the plug without any risk of data loss or corruption. The Adafruit script forces Raspbian to store all its temporary data in memory, […]

Source: Read-only Raspberry Pi script: how to secure a micro SD card so nothing can be written to it – The MagPi Magazine

Example syntax for Secure Copy (scp)

What is Secure Copy?

scp allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh.

Source: Example syntax for Secure Copy (scp) (hypexr.org)