5 Best Antivirus Apps for Android

Some people do not believe anti-virus apps are necessary, but if you want an extra layer of security on your Android device, having a decent anti-malware app won’t do any harm and will likely eliminate the most common threats to your system. With the multitude of anti-virus apps available on Google Play, it can be hard to pick a good one, so we’ve put together a list of five great apps that can guarantee a malware-free device if used properly.

Source: 5 Best Antivirus Apps for Android (Make Tech Easier)

How to Backup or Clone a Disk in Linux by using Clonezilla

Disk cloning or Clone a Disk is the process of copying data from a hard disk to another one, in fact you can do this process by copy & paste but you won’t be able to copy the hidden files and folders or the in-use files, that’s why you need a cloning software to do the job, also you may need the cloning process to save a backup image from your files and folders.

Source: How to Backup or Clone a Disk in Linux by using Clonezilla | Unixmen

How to Secure Erase Free Space on Mac Drives with OS X El Capitan

Many Mac users running a modern version of OS X El Capitan have noticed the Secure Erase Free Space feature has gone missing from Disk Utility. What the “Erase Free Space” feature did (and still does in prior versions of Mac OS X) was overwrite the free space on a drive to prevent file recovery, adding a layer of security and privacy to file removal, much in the way that Secure Empty Trash performed a similar function of overwriting data after removal.

Source: How to Secure Erase Free Space on Mac Drives with OS X El Capitan (OS X Daily)

Stop Opera’s New VPN from Leaking Your IP Address

Last week, Opera added a VPN to the dev version of its browser, which was certainly good news. The bad news is that unlike the more robust VPNs it tries to replace, it leaks data that should be encrypted all over the place, namely your private IP address. Here’s how to fix it.

Source: Stop Opera’s New VPN from Leaking Your IP Address (Lifehacker)

How to Enable Pasting Text on Sites That Block It

Some companies think they’re increasing security by disabling your ability to paste into form fields, such as the password field. But in reality, all they’re doing is frustrating users–and probably decreasing security by blocking password managers. Here’s how to solve this annoyance in Chrome and Firefox.

Source: How to Enable Pasting Text on Sites That Block It (How-To Geek)

10 Easy Ways to Restore Your Linux System

Reverting your operating system to a previous state without consequences sounds almost like magic. You can quickly return to your work as if nothing happened, even when you don’t know what caused the problem. That’s why the System Restore feature is among the top things ex-Windows users want from Linux. Some go as far as proclaiming that Linux will never be as good as Windows because it lacks System Restore.

(Or as good as OS X because it lacks an equivalent to Time Machine, which was around long before Windows added System Restore.)

Those users should read the manual, or even better, this article, because today we’ll present the tools that bring System Restore functionality to Linux. True, they’re not always available by default, but neither is System Restore in Windows 10. You could also argue that they don’t behave exactly the same as their Windows counterpart, but then again, the way System Restore works changed between Windows versions.

Source: 10 Easy Ways to Restore Your Linux System (MakeUseOf)

Top 5 Best Security-Centric Linux Distributions Of 2016

Staying anonymous on the Internet might not necessarily mean the same as surfing the web safely but rather keeping yourself safe from prying eyes that may otherwise take advantage of the vulnerability of your system thereby exposing you and your data for whomever might just be up for the grabbing – especially some hacker snooping around for sensitive data to hoard (particularly if you’re being targeted) and use for otherwise evil purposes that can have some serious effects on the violated individual.

However, for whatever reason you might want to remain anonymous or unidentifiable (if you may) on the net, in this article is our pick of tools that will help you achieve your purpose effectively without the risks that usually come with surfing the Internet unprotected.

Source: Top 5 Best Security-Centric Linux Distributions Of 2016 (Tecmint)