Blog

NextDNS

Posted on:

NextDNS is a DNS service that protects you from all kinds of security threats and also blocks ads and trackers on websites. It’s recommended for security and privacy. There is a free plan or a paid one. The installation is easy.You should register on the website:https://nextdns.io/ In the user panel […]

Blog

Mullvad Browser and VPN

Posted on:

In today’s post, I want to write about a very interesting VPN provider: Mullvad VPN. This company offers VPN services and also has the Mullvad Browser. Mullvad VPN has an interesting feature of quantum security for the WireGuard protocol, as well as an obfuscation option. On the other hand, Mullvad […]

Blog

A Firewall in Linux Systems

Posted on:

A firewall prevent unauthorized access to your computer. It’s a crucial part of security in your operating system. For Debian-compatible distributions like Ubuntu, if you want to use a graphical interface, the easiest way is to install the gufw program:sudo apt-get updatesudo apt-get install gufw Once installed, you can run […]

Blog

AppArmor Security Module

Posted on:

In Debian-based distributions such as MX Linux, Ubuntu, or Linux Mint, as well as in other distributions, it is advisable to enable AppArmor. AppArmor is an additional security module for the Linux system. However, RPM-based systems have the SELinux module with similar functions. To enable AppArmor, you should install it […]

Blog

Disable ICMP Echo (PING) in Linux

Posted on:

You can use this advice in many different distributions of Linux. When using a computer with Linux, in addition to various tips included in my publication and on this blog, it is worth considering disabling ICMP echo, which is the response to PING queries. ICMP (Internet Control Message Protocol) is […]

Blog

Tip for Flatpak Users

Posted on:

Many of you probably use Flatpak. It’s often a useful and very good solution. Most of you are probably aware of the need to update the system. However, many people do not know or do not remember that Flatpaks also need updating. In most Linux distributions, they are not updated […]

Blog

User Accounts

Posted on:

For computer security reasons – the first thing you should do after installing the system is to create an administrator user, which belongs to the sudo group in Debian-based systems or the wheel group in Red Hat and Fedora compatible systems. Next, if possible, you should disable the root account.To […]