Skip to content
eirenicon llc
  • Welcome
  • Ardens
    • Ardens Public Documentation
    • Artificial Intelligence- Compass
    • The Abyss
    • Lens of Emergent Intelligence
    • Intelligence Amplification Riff
    • Braid Sings, Resists, and Remembers
    • Anomalies in LLM Behavior
  • Irrelevant Thoughts
  • eirenicon Research
    • Intelligence Framework
    • Security Hardening
      • CyberSecurity
  • Contact
  • Toggle website search
Menu Close
  • Welcome
  • Ardens
    • Ardens Public Documentation
    • Artificial Intelligence- Compass
    • The Abyss
    • Lens of Emergent Intelligence
    • Intelligence Amplification Riff
    • Braid Sings, Resists, and Remembers
    • Anomalies in LLM Behavior
  • Irrelevant Thoughts
  • eirenicon Research
    • Intelligence Framework
    • Security Hardening
      • CyberSecurity
  • Contact
  • Toggle website search

Resilience

  1. Home>
  2. Knowledgebase>
  3. CyberSecurity>
  4. Resilience>
  5. Page 2
black and gray laptop computer turned on

ClamAV Installation and Usage

  • Post author:Mark Rabideau
  • Post published:May 7, 2025
  • Post category:Resilience/tutorials

How to Install and Run ClamAV on Arch Linux Step 1: Install ClamAV Open your terminal and run the following command: sudo pacman -S clamav Step 2: Update Virus Definitions…

Continue ReadingClamAV Installation and Usage
close up shot of keyboard buttons
Photo by Miguel Á. Padriñán on Pexels.com

Google Logins & Privacy

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Resilience/tutorials

Navigating Google Logins in Privacy-Focused Setups Google logins present unique challenges for privacy-conscious users utilizing VPNs and privacy browsers like Tor Browser or Mullvad Browser. Below is an analysis of…

Continue ReadingGoogle Logins & Privacy
Free password lock laptop image

Secure Application & Use of KeepassXC

  • Post author:Mark Rabideau
  • Post published:March 30, 2025
  • Post category:Geeky Things/Resilience/tutorials

A Privacy-Focused Analysis Using KeePassXC for cross-browser password management in a privacy-focused setup (Hardened Firefox, Mullvad Browser, Tor Browser) offers significant security advantages but introduces usability challenges. Below is a…

Continue ReadingSecure Application & Use of KeepassXC
  • Go to the previous page
  • 1
  • 2

Support us!

Buy Covid Masks ... Buy "Cool" Linux "Stuff".

Recent Posts

  • AI-Powered Genealogy: Free Tools and Tips for Your Family History Journey
  • Expanded Guardrails: Biasing Toward Human-Centric Values
  • Foundations Laid for Adaptive Human-AI Intelligence Amplification
  • Liminal Spaces
  • Securonis- A hardened Desktop for daily use
  • A Checklist to aid in evaluating privacy/security-focused Linux Distros for daily use

Categories

Mark Rabideau Credentials

Mark Rabideau's credentials and background.
Mastodon | CC BY-ND 4.0 - 2001 - 2025 eirenicon llc. - WordPress Theme by OceanWP
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}