Blog

Disable ICMP Echo (PING) in Linux

Posted on:

You can use this advice in many different distributions of Linux. When using a computer with Linux, in addition to various tips included in my publication and on this blog, it is worth considering disabling ICMP echo, which is the response to PING queries. ICMP (Internet Control Message Protocol) is […]

Blog

User accounts

Posted on:

For computer security reasons – the first thing you should do after installing the system is to create an administrator user, which belongs to the sudo group in Debian-based systems or the wheel group in Red Hat and Fedora compatible systems. Next, if possible, you should disable the root account.To […]

Blog

Web browsers

Posted on:

The web browser is currently one of the most important and frequently used applications. There are several good web browsers available now.I would recommend using Firefox or Brave. It should be noted that when a user uses a browser to surf the internet, they leave their “fingerprint” on the visited […]

Blog

VPN Services

Posted on:

I would like to recommend using a solution called VPN – Virtual Private Networks, on your device (phone, tablet, or computer). This way, you can enhance your privacy and computer security. VPN transforms your internet connection into an encrypted and more secure tunnel. Currently, there are many solutions of this […]

Blog

Welcome post

Posted on:

Welcome on a site about Linux, privacy and security! Computer security is becoming an increasingly important issue for both home users and businesses and institutions. I’ll write here about those topics. I would also recommend an ebook: Linux – a Secure Personal Computer for Beginners by Mark Emerson https://books2read.com/b/38n9x6 Many […]