With his how to you learn to install CyberGhost on OpenHAB. This potentially helps to increase privacy for your OpenHAB. Note – you must read the below: Virtual Private Networks (VPN) are a great technology, but it is not in all countries and states allowed You are fully responsible and...
Continue reading...Privacy
Explore this great repository for Privacy how to’s. You will find data privacy relevant guidelines, how to’s and tutorials.
Privacy
Privacy means a state in which one is not observed or disturbed by other people. This is of particular importance for data and information. Today cybersecurity is often leveraged on to ensure privacy of data.
Furthermore, these days there are many debates about the level of data privacy if it comes to personal data. Especially in the European Union, but also in the United States dedicated laws for dealing with data privacy were made. Many people think on one hand, these laws go to far, whilst many people for which data privacy is an important priority think the current regulations are not enough.
A point that I can recommend is to take the initiative and control data your own wherever possible. The internet offers plenty of tools for encryption, etc. to help with this. If it comes to social media, than I suggest to consider twice before sharing information.
About the How To’s
The how to’s, guidelines and tutorials that you can find in this category provide you generally with instructions and ideas that can be use- or helpful for you to resolve a certain challenge or to improve a certain situation. The how to’s have no right for correctness nor you should use them without thinking about the content. You should even challenge and understand the how to’s in order to ensure appropriate usage for your use case.
Contribute!
You are free to contribute and i would love to see your comments or even you touching base with me for adding a how to that you wrote and that you like to share with the world. Please feel free to contact me any time!
Install Cyberghost on Raspberry Pi
With his how to you learn installing CyberGhost VPN on your Raspberry Pi. Its actually not too difficult, but there are a couple of things you need to know. Important Note: Virtual Private Networks (VPN) are a great technology, but it is not in all countries and states allowed You...
Continue reading...SSH Key Authentication ed25519
This How To SSH Key Authentication ed25519 for Linux helps you to increase security for Linux and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To SSH Key Authentication ed25519 Background How To SSH...
Continue reading...Configure SSH Key Authentication For Linux
This How To Configure SSH Key Authentication For Linux helps you to increase security for Linux and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To Configure SSH Key Authentication For Linux Background How...
Continue reading...Setup SSH Key Authentication For Linux
This How To Setup SSH Key Authentication For Linux helps you to increase security for Linux and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To Setup SSH Key Authentication For Linux Background How...
Continue reading...Generate ed25519 Keys
This How To Generate ed25519 Keys helps you to increase security for SSH, but also to have an easier life with login. It guides you thru the ed25519 Keys generation. Index of How To Generate ed25519 Keys Background How To Generate ed25519 Keys Additional Information Follow me Help and Comments...
Continue reading...Use SSH Key Authentication
This How To Use SSH Key Authentication helps you to increase security for SSH, but also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To Use SSH Key Authentication Background How To Use...
Continue reading...SSH Key Authentication for OpenHAB
This How To SSH Key Authentication for OpenHAB helps you to increase security for OpenHAB and also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To SSH Key Authentication for OpenHAB Background How To SSH...
Continue reading...Setup SSH Key Authentication
This How To Setup SSH Key Authentication helps you to increase security for SSH, but also to have an easier life with login. The how to further consists of additional system hardening options for your consideration. Index of How To Setup SSH Key Authentication Background How To Setup...
Continue reading...Cryptomator Files Stored In iCloud Not Available On Mac
Overall, Cryptomator is very reliable and its amazing how simple it on one hand encrypts data, but on the other hand makes it available across the Apple world (e.g. iPhone, iPad, Mac). However, from time to time I faced that files stored with Cryptomator in the iCloud did not become...
Continue reading...