This how to helps you to learn how to find out the ClamAV version you are running. Indeed, a simple command helps to find this out. Index Of How To Find Out The ClamAV Version Background How To Find Out The ClamAV Version Additional Information Follow me Help and...
Continue reading...Linux
Delete WiFi Network On Raspberry
This how to helps you to learn how you enforce your Raspberry Pi to Delete a WiFi Network On Raspberry. As you can imagine, it’s quite simple, but as usual there are a couple of aspects that you need to know. Mainly, in which file the WiFi data is stored...
Continue reading...Parent Control With UniFi
This How To Parent Control With UniFi With Unifi helps you to enable a better protection for your children’s in your home WiFi network. It’s actually very simple to improve the protection. To enable better protection, we will in this HowTo be leveraging on both, OpenDNS and the UniFi USG...
Continue reading...Install Cyberghost on Raspberry Pi
With his how to you learn installing CyberGhost VPN on your Raspberry Pi. Its actually not too difficult, but there are a couple of things you need to know. Important Note: Virtual Private Networks (VPN) are a great technology, but it is not in all countries and states allowed You...
Continue reading...SSH Key Authentication ed25519
This How To SSH Key Authentication ed25519 for Linux helps you to increase security for Linux and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To SSH Key Authentication ed25519 Background How To SSH...
Continue reading...PRE Node on Raspberry
This great How To PRE Node on Raspberry helps you to get installed a Preserve Node on your Raspberry Pi. A $PRE node helps not only the community, but also it helps you to earn $PRE. WARNING: Before starting, you must consult your local authorities to find out if...
Continue reading...Suspect Files Warning
This how to helps you to learn to deal with rkhunter suspect files warning. Rkhunter could for example report suspect files after a software update, but also in case of a materialization of the cyber risks you are facing. Index Of How To rkhunter Suspect Files Warning Background How To...
Continue reading...Difference Between PARTUUID and UUID
Unix based systems, incl. Linux (Debian, Ubuntu, SuSe) and Apple Mac typically consider PARTUUID and UUID for storage devices. There is however a difference between PARTUUID an UUID. Its basically not the same! Index of Difference Between PARTUUID and UUID Background How To Find PARTUUID and UUID Additional Information Background...
Continue reading...How To Use SCP
SCP is a command line program that allows to copy files between computers (hosts) in a very secure manner. This How To How To Use SCP describes how you can copy files securely between computers. Index of How To How To Use SCP Environment How to How To Use SCP...
Continue reading...Find Out Wireguard Version
This how to helps you to learn how you can Find Out Wireguard Version in Linux. It works for most Linux distributions, incl. Debian. Index Of How To Find Out Wireguard Version Background How To Find Out Wireguard Version Additional Information Follow me Help and Comments Linking and Recommending the...
Continue reading...