Skip to content
eirenicon llc
  • Welcome
  • Ardens
    • Ardens Public Documentation
    • Artificial Intelligence- Compass
    • The Abyss
    • Lens of Emergent Intelligence
    • Intelligence Amplification Riff
    • Braid Sings, Resists, and Remembers
    • Anomalies in LLM Behavior
  • Irrelevant Thoughts
  • eirenicon Research
    • Intelligence Framework
    • Security Hardening
      • CyberSecurity
  • Contact
  • Toggle website search
Menu Close
  • Welcome
  • Ardens
    • Ardens Public Documentation
    • Artificial Intelligence- Compass
    • The Abyss
    • Lens of Emergent Intelligence
    • Intelligence Amplification Riff
    • Braid Sings, Resists, and Remembers
    • Anomalies in LLM Behavior
  • Irrelevant Thoughts
  • eirenicon Research
    • Intelligence Framework
    • Security Hardening
      • CyberSecurity
  • Contact
  • Toggle website search

CyberSecurity

  1. Home>
  2. Knowledgebase>
  3. CyberSecurity>
  4. Page 2
colorful javascript code display on screen
Photo by Rashed Paykary on Pexels.com

chkrootkit Installation and Usage on Arch Linux

  • Post author:Mark Rabideau
  • Post published:May 7, 2025
  • Post category:Resilience/tutorials

How to Install and Run chkrootkit on Arch Linux Step 1: Install chkrootkit Open your terminal and run the following command: sudo pacman -S chkrootkit Step 2: Run chkrootkit To…

Continue Readingchkrootkit Installation and Usage on Arch Linux
Rootkit code
Rootkit code

rkhunter Installation and Usage on Arch Linux

  • Post author:Mark Rabideau
  • Post published:May 7, 2025
  • Post category:Resilience/tutorials

How to Install and Run rkhunter on Arch Linux Step 1: Install rkhunter Open your terminal and run the following command: sudo pacman -S rkhunter Step 2: Update rkhunter Database…

Continue Readingrkhunter Installation and Usage on Arch Linux
black and gray laptop computer turned on

ClamAV Installation and Usage

  • Post author:Mark Rabideau
  • Post published:May 7, 2025
  • Post category:Resilience/tutorials

How to Install and Run ClamAV on Arch Linux Step 1: Install ClamAV Open your terminal and run the following command: sudo pacman -S clamav Step 2: Update Virus Definitions…

Continue ReadingClamAV Installation and Usage
ChatGPT Image May 6, 2025, Security Sentinel

Building a Resilient Desktop

  • Post author:Mark Rabideau
  • Post published:May 6, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

A Personal Security Checklist (In Progress) significant revisions: 7 May 201516 May 202527 May 2025 “Security is a process, not a product.” I came to building a secure traveling laptop…

Continue ReadingBuilding a Resilient Desktop
close up shot of keyboard buttons
Photo by Miguel Á. Padriñán on Pexels.com

Google Logins & Privacy

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Resilience/tutorials

Navigating Google Logins in Privacy-Focused Setups Google logins present unique challenges for privacy-conscious users utilizing VPNs and privacy browsers like Tor Browser or Mullvad Browser. Below is an analysis of…

Continue ReadingGoogle Logins & Privacy
Free password lock laptop image

Secure Application & Use of KeepassXC

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Resilience/tutorials

A Privacy-Focused Analysis Using KeePassXC for cross-browser password management in a privacy-focused setup (Hardened Firefox, Mullvad Browser, Tor Browser) offers significant security advantages but introduces usability challenges. Below is a…

Continue ReadingSecure Application & Use of KeepassXC
colorful javascript code display on screen
Photo by Rashed Paykary on Pexels.com

Comparison of Firefox (Hardened) – Mullvad – Tor browsers

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

Below is a detailed comparison of hardened Firefox, Mullvad Browser, and Tor Browser in terms of performance, privacy, compatibility, and usability. These browsers are all based on Firefox but prioritize…

Continue ReadingComparison of Firefox (Hardened) – Mullvad – Tor browsers
person using black and gray laptop computer beside white ceramic cup on brown wooden table
Photo by Kevin Paster on Pexels.com

A comparison of Mullvad VPN vs. ProtonVPN

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

Security VPN Browsers: Performance, Privacy, and Usability Comparison Below is a detailed comparison of Hardened Firefox, Mullvad Browser, and Tor Browser in terms of performance, privacy, compatibility, and usability. These…

Continue ReadingA comparison of Mullvad VPN vs. ProtonVPN
robot pointing on a wall
Photo by Tara Winstead on Pexels.com

Security Hardening: A Journey with Eyes Open

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

This guide aims to equip you with the insights necessary to navigate the complexities of security hardening, fostering a balanced and effective approach tailored to your unique requirements. Significant Revisions:-…

Continue ReadingSecurity Hardening: A Journey with Eyes Open
Big Brother Matrix
Photo by Markus Spiske on Unsplash

Keep ‘Big Brother’ at bay

  • Post author:ManyRoads
  • Post published:February 13, 2025
  • Post category:CyberSecurity/eirenicon/Geeky Things/tutorials

Internet, email, computer security Top Photo by Markus Spiske on Unsplash Welcome to a bunch of data links re: securing your information/ internet life. I have built this simple ‘tutorial’…

Continue ReadingKeep ‘Big Brother’ at bay
  • Go to the previous page
  • 1
  • 2
  • 3
  • Go to the next page

Support us!

Buy Covid Masks ... Buy "Cool" Linux "Stuff".

Recent Posts

  • AI-Powered Genealogy: Free Tools and Tips for Your Family History Journey
  • Expanded Guardrails: Biasing Toward Human-Centric Values
  • Foundations Laid for Adaptive Human-AI Intelligence Amplification
  • Liminal Spaces
  • Securonis- A hardened Desktop for daily use
  • A Checklist to aid in evaluating privacy/security-focused Linux Distros for daily use

Categories

Mark Rabideau Credentials

Mark Rabideau's credentials and background.
Mastodon | CC BY-ND 4.0 - 2001 - 2025 eirenicon llc. - WordPress Theme by OceanWP
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}