Ultimate Guide to Securing Linux Systems
My Guide to securing Linux, this is based on two approaches which work together to assist you in protecting your privacy and data while using Linux. Use cases from four people I know who use Linux and a Decision Tree to help find the best fit for a Linux Distribution.
Chapters
00:00 - Intro
00:52 - Joe and Jill
02:04 - Five Things Joe and Jill should do
03:01 - Action 2
04:11 - Action 3
04:57 - Action 4
05:48 - Action 5
07:27 - Specific Things Joe and Jill can Do
07:46 - VPN
08:19 - Full Disk Encryption
08:43 - Alice Use Case - Social Media Fan
10:13 - But her friends are all use Facebook
11:30 - Reduce Time on Facebook
12:19 - Ted - Gamer and Streamer
14:01 - OBS advice
14:32 - Wrap-up
Support me on Patreon: https://www.patreon.com/DJWare
Follow me:
Twitter @djware55
Facebook:https://www.facebook.com/don.ware.7758
Gitlab: https://gitlab.com/djware27
Chapters
00:00 - Intro
00:52 - Joe and Jill
02:04 - Five Things Joe and Jill should do
03:01 - Action 2
04:11 - Action 3
04:57 - Action 4
05:48 - Action 5
07:27 - Specific Things Joe and Jill can Do
07:46 - VPN
08:19 - Full Disk Encryption
08:43 - Alice Use Case - Social Media Fan
10:13 - But her friends are all use Facebook
11:30 - Reduce Time on Facebook
12:19 - Ted - Gamer and Streamer
14:01 - OBS advice
14:32 - Wrap-up
Support me on Patreon: https://www.patreon.com/DJWare
Follow me:
Twitter @djware55
Facebook:https://www.facebook.com/don.ware.7758
Gitlab: https://gitlab.com/djware27
DJ Ware
I would like to use this channel to give back to the community what I have learned from others. I cover a wide range of topics on computing technology from Home Server setup on a budget, Linux for general use (workstation, server and development), High P...