Advertisement
bgREVLN8FU

11 CYBERSECURITY BASICS

Jun 20th, 2019
3,283
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.71 KB | None | 0 0
  1. INTRODUCTORY CYBERSECURITY AND BASICS
  2. [20 June 2019]
  3.  
  4. + + + + + + + + + + + + + + + + + + + + + + + +
  5.  
  6. Some information in this section has been adapted from:
  7. https://github.com/mayfrost/guides/blob/master/CHECKLIST.md
  8.  
  9. + + + + + + + + + + + + + + + + + + + + + + + +
  10.  
  11. The Basics of Cybersecurity
  12. Use open-source software.
  13. Open-source software can be publicly audited and examined for potential spyware/tracking elements.
  14. Install GNU/Linux, an open-source operating system.
  15. PCLinuxOS, Devuan, Kali, Bastille Linux (or)
  16. A distro free from systemd and/or BSD (or)
  17. Install Gentoo :^)
  18.  
  19. Use anti-tracking software.
  20. An email client that blocks web beacons.
  21. Thunderbird (w/plugin), Mailx, Mitt, Alpine
  22.  
  23. A web browser that disables Javascript, cookies, etc.
  24. Firefox (w/custom settings), GNU IceCat
  25.  
  26. Use a password manager.
  27. Do NOT use a cloud/online manager.
  28. Keep password databases backed up in encrypted folders or on a private USB stick.
  29.  
  30. Use alternative/federated websites and providers.
  31. Cock.li (Alternative email service)
  32. Tutanova (Alternative email service)
  33. IRC (Alternative chat networking)
  34. Mastodon (Federated Twitter alternative)
  35. Searx (Federated Google alternative)
  36. Peertube (Federated YouTube alternative)
  37.  
  38. Use encryption.
  39. Encrypt emails with GnuPG.
  40. Use the Tor Browser.
  41.  
  42. Use common sense.
  43. Do NOT use your real name online.
  44. Do NOT give out personal information.
  45. Create unique, randomly generated identities for new online accounts.
  46. Anonymize written messages using anti-stylometry software.
  47. When sharing files, delete any metadata.
  48.  
  49. + + + + + + + + + + + + + + + + + + + + + + + +
  50.  
  51. Introductory Cybersecurity Software and Terms
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement