Author Archives: Dave McKay

The Trickbot Botnet is Dead – Or Is It?

In the run-up to the 2020 US election, Microsoft launched an offensive against a prolific botnet called Trickbot. Did they manage to kill the threat? We explain how it panned out.Read This Article on CloudSavvy IT › Continue reading

Posted in Uncategorized | Comments Off on The Trickbot Botnet is Dead – Or Is It?

Why Are Some Network Ports Risky, And How Do You Secure Them?

There’s a network port for every type of traffic. Some ports are more at risk than others. Here are the worst offenders and what you can do to secure them.Read This Article on CloudSavvy IT › Continue reading

Posted in Uncategorized | Comments Off on Why Are Some Network Ports Risky, And How Do You Secure Them?

How to Use OpenPGP Encryption for Emails in Thunderbird

Mozilla Thunderbird recently integrated OpenPGP right into the main application. No add-ons are needed for email privacy. OpenPGP’s world-class encryption is easy to set up and use without additional software.Read This Article on How-To Geek &rsa… Continue reading

Posted in Uncategorized | Comments Off on How to Use OpenPGP Encryption for Emails in Thunderbird

Why Do They Spell Phishing With ‘ph?’ An Unlikely Homage

Back in the counter-culture days of the U.S., a group of people developed an obsession with telephone systems. It gave us the first hackers, the weird spelling of phishing, and Apple, Inc.Read This Article on CloudSavvy IT › Continue reading

Posted in Uncategorized | Comments Off on Why Do They Spell Phishing With ‘ph?’ An Unlikely Homage

How to Encrypt Files with gocryptfs on Linux

Do you want to encrypt important files, but not your Linux system’s entire hard drive? If so, we recommend gocryptfs. You’ll get a directory that, essentially, encrypts and decrypts everything you store.Read This Article on How-To Geek &rsa… Continue reading

Posted in Uncategorized | Comments Off on How to Encrypt Files with gocryptfs on Linux

What Are the Three Pillars of Cybersecurity?

Cybersecurity is a business issue, not an IT issue. Organizations must foster a cybersecurity culture championed by management and supported by technology, governance, and staff awareness.Read This Article on CloudSavvy IT › Continue reading

Posted in Uncategorized | Comments Off on What Are the Three Pillars of Cybersecurity?

How to Run a Linux Command When a File Set Changes

Learn how to run Linux commands when any file in a watched set of files changes, and when new files are created. We show you how to use this flexible tool.Read This Article on CloudSavvy IT › Continue reading

Posted in Uncategorized | Comments Off on How to Run a Linux Command When a File Set Changes

How to Use a Raspberry Pi as a Proxy Server (with Privoxy)

A Raspberry Pi proxy server allows you to control the websites people can visit. It can also remove trackers and other unwanted junk from those web pages. Follow these simple steps to set it up.Read This Article on How-To Geek › Continue reading

Posted in Uncategorized | Comments Off on How to Use a Raspberry Pi as a Proxy Server (with Privoxy)

How to Use the Hugo Static Site Generator on Linux

Static websites are easy to create and blazingly fast to use. If you learn to use Hugo, you can generate theme-based static websites on Linux. Creating websites is fun again!Read This Article on How-To Geek › Continue reading

Posted in Uncategorized | Comments Off on How to Use the Hugo Static Site Generator on Linux

How To Check If Staff Emails Are in Data Breaches

Are the login credentials of your staff on the dark web? We show you how to check whether their data has been caught up in a data breach.Read This Article on CloudSavvy IT › Continue reading

Posted in Uncategorized | Comments Off on How To Check If Staff Emails Are in Data Breaches