Blog

Mullvad Browser and VPN

Posted on:

In today’s post, I want to write about a very interesting VPN provider: Mullvad VPN. This company offers VPN services and also has the Mullvad Browser. Mullvad VPN has an interesting feature of quantum security for the WireGuard protocol, as well as an obfuscation option. On the other hand, Mullvad […]

Blog

A Firewall in Linux Systems

Posted on:

A firewall prevent unauthorized access to your computer. It’s a crucial part of security in your operating system. For Debian-compatible distributions like Ubuntu, if you want to use a graphical interface, the easiest way is to install the gufw program:sudo apt-get updatesudo apt-get install gufw Once installed, you can run […]

Blog

AppArmor Security Module

Posted on:

In Debian-based distributions such as MX Linux, Ubuntu, or Linux Mint, as well as in other distributions, it is advisable to enable AppArmor. AppArmor is an additional security module for the Linux system. However, RPM-based systems have the SELinux module with similar functions. To enable AppArmor, you should install it […]

Blog

Disable ICMP Echo (PING) in Linux

Posted on:

You can use this advice in many different distributions of Linux. When using a computer with Linux, in addition to various tips included in my publication and on this blog, it is worth considering disabling ICMP echo, which is the response to PING queries. ICMP (Internet Control Message Protocol) is […]

Blog

Tip for Flatpak Users

Posted on:

Many of you probably use Flatpak. It’s often a useful and very good solution. Most of you are probably aware of the need to update the system. However, many people do not know or do not remember that Flatpaks also need updating. In most Linux distributions, they are not updated […]

Blog

User Accounts

Posted on:

For computer security reasons – the first thing you should do after installing the system is to create an administrator user, which belongs to the sudo group in Debian-based systems or the wheel group in Red Hat and Fedora compatible systems. Next, if possible, you should disable the root account.To […]

Blog

Web Browsers

Posted on:

The web browser is currently one of the most important and frequently used applications. There are several good web browsers available now.I would recommend using Firefox or Brave. It should be noted that when a user uses a browser to surf the internet, they leave their “fingerprint” on the visited […]

Blog

VPN Services

Posted on:

I would like to recommend using a solution called VPN – Virtual Private Networks, on your device (phone, tablet, or computer). This way, you can enhance your privacy and computer security. VPN transforms your internet connection into an encrypted and more secure tunnel. Currently, there are many solutions of this […]