Probably more than you ever wanted to know about how to protect your privacy online

There are people who don’t do enough to protect their privacy online (like those who use the exact same password for every site they visit) and then there are the people who are ultra-concerned about protecting their privacy and covering their tracks online. This article is clearly intended for the latter group.

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.

Source: privacy tools – encryption against global mass surveillance đź”’

Getting started with Let’s Encrypt SSL Certificates on Ubuntu

This tutorial will guide you through your very first configuration of an SSL website with Let’s Encrypt certification. Let’s Encrypt is a new SSL authority that provides free SSL certificates. We are going to use two existing tutorials (“How to setup an intermediate compatible SSL website with Let’s Encrypt certificate” and “The Perfect Server – Ubuntu 15.10 (Wily Werewolf) with Apache, PHP, MySQL, PureFTPD, BIND, Postfix, Dovecot and ISPConfig 3”).

The setup described here is compatible with any Ubuntu LAMP server, so you can use this one as the basis setup too.

This tutorial will show you how to setup Let’s Encrypt on Servers without ISPConfig 3 as there will be a direct implementation of the Let’s Encrypt service in the next ISPConfig 3 release (version 3.1) soon. So if you plan to use ISPConfig, wait for the 3.1 release and also a new tutorial.

Source: Getting started with Let’s Encrypt SSL Certificates on Ubuntu (Howtoforge)

Secure Shell Access (SSH) – Linux Command Line | Code Snipcademy

Secure Shell Access (SSH) – Learn about Secure Shell Access (SSH), private and public keys, SCP, and all other topics related to the ssh command in our beginner’s tutorial.

Introduction – Introduction to SSH, how it’s better than telnet and basic ssh commands.

SSH Keys: RSA and DSA – Learn about SSH public and private keys, along with the most widely used key types – RSA and DSA. Also learn how to easily copy your public key to a host server with the ssh-copy-id command.

SSH Agent and SSH Add – Learn how to use the SSH agent daemon and the ssh-add command to manage your SSH keys and passphrases.

Secure Copying (SCP) – Learn how to use the scp command to upload and download files from remote hosts.

Source: Secure Shell Access (SSH) – Linux Command Line | Code Snipcademy

Protecting Apache Server From Denial-of-Service (Dos) Attack | Unixmen

Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands of-unique IP addresses.

What is mod_evasive?

mod_evasive is an evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently reports abuses via email and syslog facilities.

Source: Protecting Apache Server From Denial-of-Service (Dos) Attack | Unixmen

How to disable Ipv6 on Ubuntu, Linux Mint, Debian

So if ipv6 is not supported on your network infrastructure, it might be useful to disable it all together. Why ? It can cause issues like delayed domain lookups, un-necessary attempts to connect to ipv6 addresses causing delay in network connection etc.

Source: How to disable Ipv6 on Ubuntu, Linux Mint, Debian (BinaryTides)

(This is also applicable to a Raspberry Pi running Raspbian, or some other Debian derivative such as RasPBX)

Easy Linux backup software with Time Machine like functionality | Nuxified.org

It’s easy to be impressed by Apple’s Time Machine backup feature. It works in the background, is seamlessly integrated, and when you need to get to restore something whoa.. you’re all of a sudden in space, travelling back in time, bringing something back to the present.

There are two key things to this system. First it’s an incremental backup system which allows you to restore from multiple past versions of files that are backed up (the “time travelling”). Second, it’s very easy to use and provides a very impressive experience.

So do we have anything like that in the Linux world? Well, for the most part we do, and here’s what we’ve got.

Source: Easy Linux backup software with Time Machine like functionality | Nuxified.org
Related link: Cronopete – An Apple’s Time Machine Clone For Linux – OSTechNix

NOTE: The link to Rastersoft’s Cronopete seems to have gone missing from the article. Here it is.