If you are logging in to multiple systems from multiple systems via SSH, you are probably already used to the regular SSH key management. Now you get a new laptop and need to set up keys for everything again - that’s kind of annoying, but there’s a better solution: You can authenticate SSH logins via GPG.
Social media sites have recently been quite tumultuous places on the internet.
Many people in my environment have in fact considered deleting social networks accounts.
While I don’t have a personal stake in the game, a friend has recently asked me
to help with deleting a Facebook profile. This short blog post is my best take
on it and why you might be interested in doing the same thing yourself.
Even if you are not ready to do this step, give it a read
decide if there are areas where you want to tighten down your privacy settings.
Most of us put their laptops very frequently to sleep instead of properly shutting it down. This means that the hard drive stays decrypted. If the computer is accessed by a malicious actor, the only thing that keeps this person away from our data is the user account password. In this article I will discuss how to protect your Linux (PureOS, Debian, Ubuntu) system with two-factor authentication (2FA).
Unencrypted hard drives can easily be accessed if stolen or lost. Your account password only prevents somebody from logging in while you are away from your machine. This is why every hard drive should be fully encrypted. This article goes in detail into the LUKS full hard drive encryption on Linux and provides instructions to set the encryption up, to decrypt with GPG smart cards, and what to do in an emergency.
Unfortunately, phishing is a regular part of our lives these days and is especially bad in situations like the COVID-19 crisis. Everybody is on high alert already and bad news seem to come from all around us. Malicious actors have taken note and phishing scams have skyrocketed. While some phishing attempts are easy to spot, others can look almost legitimate. Here some basic methods are discussed that show how you can become more vigilant in order to protect yourself from phishing. Make no mistake, this topic really concerns everybody, and everybody is likely to fall for an attempt sooner or later.