Using CISSP to help secure your home network

CISSP for home network security

Using CISSP to help secure your home network I am enrolled in a Cybersecurity class right now and as with most courses I take I get to thinking about how to apply what I am learning to my own life. So I thought about how to take the Certified Information Systems Security Professional (CISSP) Domains […]

Read More… from Using CISSP to help secure your home network

Best privacy and security apps for Linux

Best privacy and security apps for linux

Here are some of the best of the best security and privacy apps for Linux. Using Linux means that you value security and privacy. Here are some of the best FOSS (Free and Open-Source Software) that I have come across. Download them and check out some great programs to keep you safer on the internet. […]

Read More… from Best privacy and security apps for Linux

The folly of banning the Tic Toc app

The folly of banning Tic Toc app

Why the Tic Toc app won’t work: The United States Congress is currently debating and investigating Tic Toc. There is little doubt that Tic Toc and their practices at shady and do not benefit the US citizens.  ByteDance, the company that owns Tic Toc operates at the pleasure of the Chinese Government and by law […]

Read More… from The folly of banning the Tic Toc app

Getting Smart With: PASS – the command line password manager

Open source command line tool to store passwords securely

Getting Smart With: PASS – the command line password manager PASS is a password manager that uses the command line in Linux to create encrypted files for the sites that you visit. PASS was designed for simplicity and adheres to the Unix philosophy. With PASS, each password lives inside of a gpg encrypted file whose […]

Read More… from Getting Smart With: PASS – the command line password manager

Hardening Your Home Router

Home Router Hardening

Hardening Your Home Router Hardening your home router is a fairly straightforward thing to do. I will explain all the steps involved and walk you through the process. So what is hardening? It is the process of securing your network so it is harder for the bad actors to get into it. Although all routers […]

Read More… from Hardening Your Home Router

How to create Windows 10/11 boot repair disk

windows recovery

How to create Windows 10/11 boot repair disk It is wise to create a Windows 10/11 boot repair disk before you have problems. All hard drives fail, things get corrupted or you have other problems and without a Windows 10/11 boot repair disk you are left without a working computer. Here are the steps to […]

Read More… from How to create Windows 10/11 boot repair disk

Alternatives to Google Search

search-alternatives

Alternatives to Google Search Google is the three-hundred pound gorilla in the room when it comes to searching on the internet, but there are privacy concerns. Searches that you make online have the potential to reveal a lot about you and your private life. This includes, but is not limited to: your habits, your interests, […]

Read More… from Alternatives to Google Search

How to achieve online privacy

Online privacy is the goal of many of us who surf the web. Unfortunately, it is a fluid concept that is only partially achieved in most cases. Who, might you ask is storing or collecting my private data? Who is spying on me? Your local device (ie. your computer or smart phone) Your local ISP […]

Read More… from How to achieve online privacy