Category: Security

Before You Pay that Ransomware Demand…

A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind. Five years ago you were more likely to get whacked by a banking trojan that stole all your passwords and credit card numbers. These days if your mobile or desktop computer is infected what gets installed is likely to be “ransomware” — malicious software that locks your most prized documents, songs and pictures with strong encryption and then requires you to pay for a key to unlock the files.

Here’s some basic advice about where to go, what to do — and what not to do — when you or someone you know gets hit with ransomware.

Source: Before You Pay that Ransomware Demand… — Krebs on Security

The Differences between Su, Sudo Su, Sudo -s and Sudo -i

In Linux, there are several ways to switch to the root user and it can be confusing. Learn the differences between each command and their use cases.

Source: The Differences between Su, Sudo Su, Sudo -s and Sudo -i (Make Tech Easier)

[OS X] Don’t Put Tape On Your Webcam, This Free App Alerts You When Someone Hacks It

It is a known issue that a hacker access the webcam and mic on your device without your consent and awareness. You can take the help of a tape but it can’t be considered a wise solution. An ex-NSA hacker has created an anti spying tool for OS X which alerts you when an application tries to access the FaceTime camera and mic.

Source: Don’t Put Tape On Your Webcam, This Free App Alerts You When Someone Hacks It

Disposing Of A PC? Nuke The Drive First.

Deleting your files isn’t good enough. Not even if you empty the recycle bin afterwards. Nor is formatting the drive. There are plenty of ways to recover data in such circumstances. Instead, you need a specialist program that can wipe the entire drive by storing random data onto every part of it, multiple times.

Source: Disposing Of A PC? Nuke The Drive First. | Gizmo’s Freeware

10 Best Password Managers For Linux Operating Systems

There are many password managers for Windows and OS X, but here we’ll look at some of the best password managers for Linux. With so many online accounts on the internet, it can be tediously difficult to remember all your passwords. Many people write them down or store them in a document, but that’s plain insecure.

Source: 10 Best Password Managers For Linux Operating Systems (Fossbytes)

Simple IPTables Tricks – Idol Star Astronomer

Securing your linux system using iptables can be a daunting task. There are some utilities that can help, but when it comes to security a deep understanding is often very useful. Fundamentally, iptables are lists of rules, executed in order, to determine if a packet should be accepted, dropped, or forwarded along. It has some very powerful features which can help you defend your services, log potential attacks, and forward traffic between computers as well as between ports on the same computer. I will cover some of the basics below.

Source: Simple IPTables Tricks – Idol Star Astronomer

Free Password Managers Compared: Which One is the Best for you?

With plenty of password managers out there, it can be difficult to choose the best one for you. Here is a list comparing free password managers.

Source: Free Password Managers Compared: Which One is the Best for you? (Make Tech Easier)

5 Best Antivirus Apps for Android

Some people do not believe anti-virus apps are necessary, but if you want an extra layer of security on your Android device, having a decent anti-malware app won’t do any harm and will likely eliminate the most common threats to your system. With the multitude of anti-virus apps available on Google Play, it can be hard to pick a good one, so we’ve put together a list of five great apps that can guarantee a malware-free device if used properly.

Source: 5 Best Antivirus Apps for Android (Make Tech Easier)

How to Backup or Clone a Disk in Linux by using Clonezilla

Disk cloning or Clone a Disk is the process of copying data from a hard disk to another one, in fact you can do this process by copy & paste but you won’t be able to copy the hidden files and folders or the in-use files, that’s why you need a cloning software to do the job, also you may need the cloning process to save a backup image from your files and folders.

Source: How to Backup or Clone a Disk in Linux by using Clonezilla | Unixmen

How to Secure Erase Free Space on Mac Drives with OS X El Capitan

Many Mac users running a modern version of OS X El Capitan have noticed the Secure Erase Free Space feature has gone missing from Disk Utility. What the “Erase Free Space” feature did (and still does in prior versions of Mac OS X) was overwrite the free space on a drive to prevent file recovery, adding a layer of security and privacy to file removal, much in the way that Secure Empty Trash performed a similar function of overwriting data after removal.

Source: How to Secure Erase Free Space on Mac Drives with OS X El Capitan (OS X Daily)

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez