Setting up Next DNS

Setting Up Next DNS - a detailed how to guide

  Setting Up Next DNS You might ask: “Don’t I already have DNS?”. The short answer is “Yes”, in most cases your ISP (the company that you buy your internet from) does give you a DNS which they own and can see and sell all of your data to third party companies. This give your […]

Read More… from Setting up Next DNS

Privacy Myths Debunked

Privacy Myths Debunked Many people have misconceptions when it comes to privacy and security. Many myths have circulate on the internet concerning them.  In this article –Privacy myths debunked – I have listed several and will try to explain why and how they are false. Here are just some of the more common ones:   […]

Read More… from Privacy Myths Debunked

Step-by-Step Home Network Inventory Guide

step-by-step home network inventory - the first step in home cybersecurity

Step-by-Step Home Network Inventory Guide Article Two – Home Cybersecurity series Taking an inventory of your home network is the first step in getting your network under control. There is an old adage that you can’t control what you don’t know about, and the same is true for your network. You have to know what […]

Read More… from Step-by-Step Home Network Inventory Guide

Home Cybersecurity (Updated)

Home cybersecurity

Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]

Read More… from Home Cybersecurity (Updated)

What to Do After Installing Pop_OS

  I really am enjoying I just received a beautiful new Thelio Mira from System 76 (they don’t advertise here, but they make a great product and I highly recommend them). When I get a new computer I install the programs and add-ons that I want on it. POP_OS is great for this. It is […]

Read More… from What to Do After Installing Pop_OS

Firefox tweaks for 2023

Firefox browser tweaks for 2023

Make your Firefox browser even more secure with just changing a few settings. Awhile back, I wrote an article on tweaking some settings for your Firefox browser, since then Firefox has evolved some with new versions, so another updated article is needed. Here are some of the settings that you should consider changing to make […]

Read More… from Firefox tweaks for 2023

Best privacy and security apps for Linux

Best privacy and security apps for linux

Here are some of the best of the best security and privacy apps for Linux. Using Linux means that you value security and privacy. Here are some of the best FOSS (Free and Open-Source Software) that I have come across. Download them and check out some great programs to keep you safer on the internet. […]

Read More… from Best privacy and security apps for Linux

Getting Smart With: PASS – the command line password manager

Open source command line tool to store passwords securely

Getting Smart With: PASS – the command line password manager PASS is a password manager that uses the command line in Linux to create encrypted files for the sites that you visit. PASS was designed for simplicity and adheres to the Unix philosophy. With PASS, each password lives inside of a gpg encrypted file whose […]

Read More… from Getting Smart With: PASS – the command line password manager

Removing Malware

Removing Malware When you are removing malware or viruses on your computer there are several steps to consider. You want to follow these steps so that you can isolate the damage to a single computer if possible and restore it to being fully functional. Steps to follow when removing malware Step One (Identify the symptoms): […]

Read More… from Removing Malware