This How To Configure SSH Key Authentication For Linux helps you to increase security for Linux and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To...
Continue reading...Privacy
Explore this great repository for Privacy how to’s. You will find data privacy relevant guidelines, how to’s and tutorials.
Privacy
Privacy means a state in which one is not observed or disturbed by other people. This is of particular importance for data and information. Today cybersecurity is often leveraged on to ensure privacy of data.
Furthermore, these days there are many debates about the level of data privacy if it comes to personal data. Especially in the European Union, but also in the United States dedicated laws for dealing with data privacy were made. Many people think on one hand, these laws go to far, whilst many people for which data privacy is an important priority think the current regulations are not enough.
A point that I can recommend is to take the initiative and control data your own wherever possible. The internet offers plenty of tools for encryption, etc. to help with this. If it comes to social media, than I suggest to consider twice before sharing information.
About the How To’s
The how to’s, guidelines and tutorials that you can find in this category provide you generally with instructions and ideas that can be use- or helpful for you to resolve a certain challenge or to improve a certain situation. The how to’s have no right for correctness nor you should use them without thinking about the content. You should even challenge and understand the how to’s in order to ensure appropriate usage for your use case.
Contribute!
You are free to contribute and i would love to see your comments or even you touching base with me for adding a how to that you wrote and that you like to share with the world. Please feel free to contact me any time!
Setup SSH Key Authentication For Linux
This How To Setup SSH Key Authentication For Linux helps you to increase security for Linux and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To...
Continue reading...Generate ed25519 Keys
This How To Generate ed25519 Keys helps you to increase security for SSH, but also to have an easier life with login. It guides you thru the ed25519 Keys generation. Index of How To Generate ed25519 Keys Background How To Generate ed25519...
Continue reading...Use SSH Key Authentication
This How To Use SSH Key Authentication helps you to increase security for SSH, but also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To...
Continue reading...SSH Key Authentication for OpenHAB
This How To SSH Key Authentication for OpenHAB helps you to increase security for OpenHAB and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To SSH...
Continue reading...Setup SSH Key Authentication
This How To Setup SSH Key Authentication helps you to increase security for SSH, but also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To...
Continue reading...Cryptomator Files Stored In iCloud Not Available On Mac
Overall, Cryptomator is very reliable and its amazing how simple it on one hand encrypts data, but on the other hand makes it available across the Apple world (e.g. iPhone, iPad, Mac). However, from time to time I faced that files stored...
Continue reading...How To Open A Cryptomator Vault On iPhone
You learn in this How To Open A Cryptomator Vault On iPhone a simple way to connect to an existing Cryptomator drive. Since pictures help to explain, included pictures show you a 10 steps approach graphically. Index Of How To Open A Cryptomator Vault...
Continue reading...How To Open A Cryptomator Vault On iPad
You learn in this How To Open A Cryptomator Vault On iPad a simple way to connect to an existing Cryptomator drive. Since pictures help to explain, included pictures show you a 10 steps approach graphically. Index Of How To Open A Cryptomator Vault On...
Continue reading...How To Create A New Cryptomator Vault On iPhone
You learn with this how to create a new Cryptomator Vault in iCloud On iPhone to protect your data for privacy or security reasons. Further, you will learn how to leverage on Cryptomator. Index Background Important Note How To Create A New...
Continue reading...