Category: Security

How to Secure Erase Free Space on Mac Drives with OS X El Capitan

Many Mac users running a modern version of OS X El Capitan have noticed the Secure Erase Free Space feature has gone missing from Disk Utility. What the “Erase Free Space” feature did (and still does in prior versions of Mac OS X) was overwrite the free space on a drive to prevent file recovery, adding a layer of security and privacy to file removal, much in the way that Secure Empty Trash performed a similar function of overwriting data after removal.

Source: How to Secure Erase Free Space on Mac Drives with OS X El Capitan (OS X Daily)

Stop Opera’s New VPN from Leaking Your IP Address

Last week, Opera added a VPN to the dev version of its browser, which was certainly good news. The bad news is that unlike the more robust VPNs it tries to replace, it leaks data that should be encrypted all over the place, namely your private IP address. Here’s how to fix it.

Source: Stop Opera’s New VPN from Leaking Your IP Address (Lifehacker)

How to Enable Pasting Text on Sites That Block It

Some companies think they’re increasing security by disabling your ability to paste into form fields, such as the password field. But in reality, all they’re doing is frustrating users–and probably decreasing security by blocking password managers. Here’s how to solve this annoyance in Chrome and Firefox.

Source: How to Enable Pasting Text on Sites That Block It (How-To Geek)

How Hackers Earned $100,000 Just By Sending A DDoS Threat In Emails

Don’t be a victim!

According to a recent revealation, a hacking group called Armada Collective collected more than $100,000 just by sending a DDoS threat in an email to online businesses.

Source: How Hackers Earned $100,000 Just By Sending A DDoS Threat In Emails (fossBytes)

10 Easy Ways to Restore Your Linux System

Reverting your operating system to a previous state without consequences sounds almost like magic. You can quickly return to your work as if nothing happened, even when you don’t know what caused the problem. That’s why the System Restore feature is among the top things ex-Windows users want from Linux. Some go as far as proclaiming that Linux will never be as good as Windows because it lacks System Restore.

(Or as good as OS X because it lacks an equivalent to Time Machine, which was around long before Windows added System Restore.)

Those users should read the manual, or even better, this article, because today we’ll present the tools that bring System Restore functionality to Linux. True, they’re not always available by default, but neither is System Restore in Windows 10. You could also argue that they don’t behave exactly the same as their Windows counterpart, but then again, the way System Restore works changed between Windows versions.

Source: 10 Easy Ways to Restore Your Linux System (MakeUseOf)

How to configure Nginx with free Let’s Encrypt SSL certificate on Debian or Ubuntu Linux

In this tutorial, I will explain how to use Let’s Encrypt to obtain a free SSL certificate and use it with Nginx on Ubuntu or Debian Linux.

Source: How to configure Nginx with free Let’s Encrypt SSL certificate on Debian or Ubuntu Linux (nixCraft)

Top 5 Best Security-Centric Linux Distributions Of 2016

Staying anonymous on the Internet might not necessarily mean the same as surfing the web safely but rather keeping yourself safe from prying eyes that may otherwise take advantage of the vulnerability of your system thereby exposing you and your data for whomever might just be up for the grabbing – especially some hacker snooping around for sensitive data to hoard (particularly if you’re being targeted) and use for otherwise evil purposes that can have some serious effects on the violated individual.

However, for whatever reason you might want to remain anonymous or unidentifiable (if you may) on the net, in this article is our pick of tools that will help you achieve your purpose effectively without the risks that usually come with surfing the Internet unprotected.

Source: Top 5 Best Security-Centric Linux Distributions Of 2016 (Tecmint)

Probably more than you ever wanted to know about how to protect your privacy online

There are people who don’t do enough to protect their privacy online (like those who use the exact same password for every site they visit) and then there are the people who are ultra-concerned about protecting their privacy and covering their tracks online. This article is clearly intended for the latter group.

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

Source: privacy tools – encryption against global mass surveillance 🔒

25 Useful IPtable Firewall Rules Every Linux Administrator Should Know

In this article, we will show you some 25 useful iptable firewall rules that will help you to manage and control you Linux firewall through iptables easily.

Source: 25 Useful IPtable Firewall Rules Every Linux Administrator Should Know (Tecmint)

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez