Erweiterte Suche
Suchergebnisse
1138 Ergebnisse gesamt
Keepassxc
[!toc] Table of Contents [!info] Getting Started {static} The official English-language KeePassXC documentation offers a very good and comprehensive “Getting Started” article. We recommend reading it to get an overview of the available features! Below, we...
Nextcloud-Webdav
[!toc] Table of Contents Nextcloud Sync Client The Nextcloud Sync Client is Nextcloud's own software for synchronizing content in the cloud with your own devices (PC, mobile phone, tablet). Installation and setup is very easy in most cases. Content synchron...
Nextcloud
[!toc] Table of Contents Nextcloud is often used as a privacy-preserving alternative to Google Drive, iCloud or other commercial Cloud providers. Nextcloud is open-source software that can be installed (hosted) by anyone on their own server. Solidarity-base...
Countermeasures
Backups
[!toc] Table of Contents Much has been written about why backups are so important, and better and worse jokes have been made about the curious fact that everyone knows this but no one seems to do it. [!success] Fact is {static} We need backups! Backups vs...
Wifi-Sd-Cards
[!toc] Table of Contents Photographers in particular often face the problem that their newly captured images are stored unencrypted on their camera's SD cards until they can transfer them to encrypted hard drives once they are back at their laptops. Added t...
Data-Hygiene
[!toc] Table of contents Whether it's network surveillance, digital forensics, or house searches: surveillance is always about data that could potentially be used against you. That's why it's important to regularly ask yourself what data is really necessary...
Communication-Encryption
[!toc] Table of Contents The encryption of all communication plays an essential role in our digital lives. In this article, we want to explain what communication encryption means, what different types of encryption exist, and what advantages and disadvantag...
Passwords
[!toc] Table of Contents Good passwords are one of the most important countermeasures against data leakage. We will discuss what constitutes a good password below. passwords secure encrypted data, such as: hard drives and password databases passwords secur...
Recommendations
Password-Manager
[!toc] Table of Contents [!info] Info {static} A password manager is an essential tool for ensuring that you take the necessary precautions to keep your passwords secure. Here you can find out what makes a good password and how you should handle them: Coun...
Messenger
[!toc] Table of Contents While emails are still regularly used for digital communication, messengers have become more popular in recent years. One advantage of (good) messengers over emails is that encryption and secure communication are part of their initi...
Clear-Metadata
[!toc] Table of Contents [!tip] Tip {static} If you don't know exactly what metadata is, read the article about this threat. The following is mostly taken from the entry on metadata in the Systemli Wiki. Exifcleaner Platform: Linux, Mac, Windows Exifclean...
Graphene-Os
[!toc] Table of Contents GrapheneOS is a mobile operating system based on Android. It is often recommended as an alternative to pre-installed (OEM) operating systems, as it can be used entirely without Google services. In addition to this feature, which pr...
Modules
Network-Role-Play
[!toc] Table of Contents This game aims to illustrate the process, but not the functionality, of network communication using the example of emails without encryption, with transport encryption, and with end-to-end encryption. It is not really a game that is...
Confiscation
[!toc] Table of Contents After seizures, there is often a lot of speculation about what information could potentially be found on the devices. In these moments, we remember all the little “security sins” we have committed over the years: photos, chats, cont...
Keepass-As-Group
[!toc] Table of Contents KeePassXC is not actually cloud software, which is one of the reasons it is so popular - none of your passwords ever leave your own computer. However, this makes it impractical for managing different logins as a group. Every time a ...