Skip to content
eirenicon llc
  • About
  • Irrelevant Thoughts
  • Troubled Times
  • Security Hardening
    • CyberSecurity
  • Knowledge Base
  • Contact
  • Toggle website search
Menu Close
  • About
  • Irrelevant Thoughts
  • Troubled Times
  • Security Hardening
    • CyberSecurity
  • Knowledge Base
  • Contact
  • Toggle website search

CyberSecurity

  1. Home>
  2. Knowledgebase>
  3. CyberSecurity>
  4. Page 2
black and gray laptop computer turned on

ClamAV Installation and Usage

  • Post author:Mark Rabideau
  • Post published:May 7, 2025
  • Post category:Resilience/tutorials

How to Install and Run ClamAV on Arch Linux Step 1: Install ClamAV Open your terminal and run the following command: sudo pacman -S clamav Step 2: Update Virus Definitions…

Continue ReadingClamAV Installation and Usage
ChatGPT Image May 6, 2025, Security Sentinel

Building a Resilient Desktop

  • Post author:Mark Rabideau
  • Post published:May 6, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

A Personal Security Checklist (In Progress) significant revisions: 7 May 201516 May 202527 May 2025 “Security is a process, not a product.” I came to building a secure traveling laptop…

Continue ReadingBuilding a Resilient Desktop
spider web in close up photography

How to Explore the Dark Web- Cautiously & Securely

  • Post author:Mark Rabideau
  • Post published:April 15, 2025
  • Post category:CyberSecurity/Geeky Things/tutorials

Major Revision Dates:- 24 May 2025 Introduction The Dark Web, a hidden part of the internet inaccessible through traditional search engines, offers both opportunities and risks.This guide provides a comprehensive…

Continue ReadingHow to Explore the Dark Web- Cautiously & Securely
close up shot of keyboard buttons
Photo by Miguel Á. Padriñán on Pexels.com

Google Logins & Privacy

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Resilience/tutorials

Navigating Google Logins in Privacy-Focused Setups Google logins present unique challenges for privacy-conscious users utilizing VPNs and privacy browsers like Tor Browser or Mullvad Browser. Below is an analysis of…

Continue ReadingGoogle Logins & Privacy
Free password lock laptop image

Secure Application & Use of KeepassXC

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Resilience/tutorials

A Privacy-Focused Analysis Using KeePassXC for cross-browser password management in a privacy-focused setup (Hardened Firefox, Mullvad Browser, Tor Browser) offers significant security advantages but introduces usability challenges. Below is a…

Continue ReadingSecure Application & Use of KeepassXC
colorful javascript code display on screen
Photo by Rashed Paykary on Pexels.com

Comparison of Firefox (Hardened) – Mullvad – Tor browsers

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

Below is a detailed comparison of hardened Firefox, Mullvad Browser, and Tor Browser in terms of performance, privacy, compatibility, and usability. These browsers are all based on Firefox but prioritize…

Continue ReadingComparison of Firefox (Hardened) – Mullvad – Tor browsers
person using black and gray laptop computer beside white ceramic cup on brown wooden table
Photo by Kevin Paster on Pexels.com

A comparison of Mullvad VPN vs. ProtonVPN

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

Security VPN Browsers: Performance, Privacy, and Usability Comparison Below is a detailed comparison of Hardened Firefox, Mullvad Browser, and Tor Browser in terms of performance, privacy, compatibility, and usability. These…

Continue ReadingA comparison of Mullvad VPN vs. ProtonVPN
robot pointing on a wall
Photo by Tara Winstead on Pexels.com

Security Hardening: A Journey with Eyes Open

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Network-Hardware/tutorials

This guide aims to equip you with the insights necessary to navigate the complexities of security hardening, fostering a balanced and effective approach tailored to your unique requirements. Significant Revisions:-…

Continue ReadingSecurity Hardening: A Journey with Eyes Open
Big Brother Matrix
Photo by Markus Spiske on Unsplash

Keep ‘Big Brother’ at bay

  • Post author:ManyRoads
  • Post published:February 13, 2025
  • Post category:CyberSecurity/eirenicon/Geeky Things/tutorials

Internet, email, computer security Top Photo by Markus Spiske on Unsplash Welcome to a bunch of data links re: securing your information/ internet life. I have built this simple ‘tutorial’…

Continue ReadingKeep ‘Big Brother’ at bay
climate sign outside blur
Photo by Markus Spiske on Pexels.com

Resisting oppression

  • Post author:ManyRoads
  • Post published:February 12, 2025
  • Post category:CyberSecurity/Geeky Things/Politics

Public Domain, Declassified Guides Caution!The document links in this message seem to be disappearing. A significant number of those that were housed at NSA, CIA, Archive.org have disappeared. I will…

Continue ReadingResisting oppression
  • Go to the previous page
  • 1
  • 2
  • 3
  • Go to the next page

Support us!

Buy Covid Masks ... Buy "Cool" Linux "Stuff".

Recent Posts

  • Linux Distributions with CIS OpenSCAP Compliance Scripts
  • Loss of Control?
  • Udiskie
  • CyberSecurity
  • Enabling AppArmor on Arch Linux
  • Installing and Setting Up hblock on Arch Linux

Mark Rabideau Credentials

Mark Rabideau's credentials and background.
Mastodon | cc.BY-NO-SA- 2001 - 2025 eirenicon llc. - WordPress Theme by OceanWP
eirenicon llc