There are services running on every Linux system.Some of these services are necessary and perform essential tasks. However, after installing a Linux system, or at any other time, you should disable unnecessary services that may be listening and have open ports.You can use the Nmap tool to gather information about […]
User Accounts
For computer security reasons – the first thing you should do after installing the system is to create an administrator user, which belongs to the sudo group in Debian-based systems or the wheel group in Red Hat and Fedora compatible systems. Next, if possible, you should disable the root account.To […]
Web Browsers
The web browser is currently one of the most important and frequently used applications. There are several good web browsers available now.I would recommend using Firefox or Brave. It should be noted that when a user uses a browser to surf the internet, they leave their “fingerprint” on the visited […]
VPN Services
I would like to recommend using a solution called VPN – Virtual Private Networks, on your device (phone, tablet, or computer). This way, you can enhance your privacy and computer security. VPN transforms your internet connection into an encrypted and more secure tunnel. Currently, there are many solutions of this […]
Choosing an Operating System for a Desktop
Ensuring security is largely related to the type of device we work on and the operating system it runs on. I will share my thoughts on safely using Linux-based PC desktops and laptops. Linux appears to be one of the better solutions when it comes to security and privacy. It […]
Welcome Post
Welcome on a site about Linux, privacy and security! Computer security is becoming an increasingly important issue for both home users and businesses and institutions. I’ll write here about those topics. I would also recommend an ebook: Linux – a Secure Personal Computer for Beginners by Mark Emerson https://books2read.com/b/38n9x6 Many […]