Home Cybersecurity (Updated)

Home cybersecurity

Home Cybersecurity updated I have wanted to update my network cybersecurity and tell you all of the things that I have learned. This will be a series of updated in-depth articles that will help you to setup your own cybersecurity in your own home. I know that this is going to be an ambitious project, […]

Read More… from Home Cybersecurity (Updated)

What to Do After Installing Pop_OS

  I really am enjoying I just received a beautiful new Thelio Mira from System 76 (they don’t advertise here, but they make a great product and I highly recommend them). When I get a new computer I install the programs and add-ons that I want on it. POP_OS is great for this. It is […]

Read More… from What to Do After Installing Pop_OS

Firefox tweaks for 2023

Firefox browser tweaks for 2023

Make your Firefox browser even more secure with just changing a few settings. Awhile back, I wrote an article on tweaking some settings for your Firefox browser, since then Firefox has evolved some with new versions, so another updated article is needed. Here are some of the settings that you should consider changing to make […]

Read More… from Firefox tweaks for 2023

Best privacy and security apps for Linux

Best privacy and security apps for linux

Here are some of the best of the best security and privacy apps for Linux. Using Linux means that you value security and privacy. Here are some of the best FOSS (Free and Open-Source Software) that I have come across. Download them and check out some great programs to keep you safer on the internet. […]

Read More… from Best privacy and security apps for Linux

Getting Smart With: PASS – the command line password manager

Open source command line tool to store passwords securely

Getting Smart With: PASS – the command line password manager PASS is a password manager that uses the command line in Linux to create encrypted files for the sites that you visit. PASS was designed for simplicity and adheres to the Unix philosophy. With PASS, each password lives inside of a gpg encrypted file whose […]

Read More… from Getting Smart With: PASS – the command line password manager

Removing Malware

Removing Malware When you are removing malware or viruses on your computer there are several steps to consider. You want to follow these steps so that you can isolate the damage to a single computer if possible and restore it to being fully functional. Steps to follow when removing malware Step One (Identify the symptoms): […]

Read More… from Removing Malware

How to achieve online privacy

Online privacy is the goal of many of us who surf the web. Unfortunately, it is a fluid concept that is only partially achieved in most cases. Who, might you ask is storing or collecting my private data? Who is spying on me? Your local device (ie. your computer or smart phone) Your local ISP […]

Read More… from How to achieve online privacy