Emergency‑Response Plan for Personal Hardware

Emergency Response plan - Personal - Hardware. Step by step considerations and code to help you plan.

Emergency‑Response Plan for Personal Hardware Introduction When a determined adversary stands at your front door, ready to snatch your computer or launch a sophisticated cyber‑attack, the outcome hinges on whether you have a pre‑written emergency‑response plan. A well‑crafted “kill‑switch” that instantly isolates the device, rotates all cryptographic material, and dumps fresh secrets to an encrypted […]

Read More…

What to Do After Installing Pop_OS

  I really am enjoying I just received a beautiful new Thelio Mira from System 76 (they don’t advertise here, but they make a great product and I highly recommend them). When I get a new computer I install the programs and add-ons that I want on it. POP_OS is great for this. It is […]

Read More…

The Best Organization Apps for Linux

The Best Organization Apps for Linux

  Getting your notes and to-do lists in order is one of the best ways to start getting more accomplished. Here are some of the best of the best when it comes to to-do list apps and note taking apps for Linux. I give you these to try out and find the ones that suit […]

Read More…

Linux Terminal Web Browsers

Linux Terminal Browsers

  There are several Linux Terminal Web Browsers that you can choose from depending on your tastes and what you are intending on doing. Here are some of my favorites, in no particular order. W3M — Linux Terminal Browser W3M is a popular open-source text-based web browser for the terminal. It supports SSL connections, colors, […]

Read More…

Getting Smart With: PASS – the command line password manager

Open source command line tool to store passwords securely

Getting Smart With: PASS – the command line password manager PASS is a password manager that uses the command line in Linux to create encrypted files for the sites that you visit. PASS was designed for simplicity and adheres to the Unix philosophy. With PASS, each password lives inside of a gpg encrypted file whose […]

Read More…