Categories
Security

Why you should set up Two-Factor Authentication (2FA). And how to do so.

Privacy and identity theft are a popular tandem these days. We increasingly erode our privacy with every new site or app sign-up — see FaceApp’s aging filter this past summer — but our ears prick up at the phrase identity theft. It’s an odd reconciliation. Passwords or PINs are the most popular way for people to maintain a shroud of privacy. In recent years, it seems there’s a widespread breach of accounts every week. Capital …

Categories
DNS Security Server Configuration Web Development

Add Let’s Encrypt SSL with manual TXT verification for GoDaddy DNS

I wanted to add SSL to a website i quickly spun up on a Lightsail instance. It was running on a subdomain. I ran into a hiccup with getting the domain verified via TXT entries in DNS when using Let’s Encrypt to setup SSL on a subdomain via GoDaddy DNS. In case you’re interested, here are the commands i used to manually add SSL with Let’s Encrypt with domain verification and prompts. Via CLI: mycli:~$ …

Categories
CLI Security Server Configuration Web Development

Apache + LetsEncrypt file ‘/etc/letsencrypt/live/…/fullchain.pem’ does not exist or is empty. Action ‘configtest’ failed.

I had setup a new Apache server and needed an SSL certificate so i went with the tried and true, quick and easy LetsEncrypt/certbot route. While testing if gzip was installed, i received errors running apachectl configtest. First time receiving this error. It seemed to be caused by the LetsEncrypt install. I probably wouldn’t have noticed it for quite some time since the https:// version of the site i just put up on the new …

Categories
Security

Bitwarden: Password Manager

Bitwarden provided instructions to import from LastPass. I suggest you read through the full guide and follow the screenshots before starting the import. It took about three minutes to get my 3,700 passwords imported into Bitwarden.

Categories
Security

How to choose a VPN for desktop and mobile (Android / iOS)

You may have heard the term “VPN” (Virtual Private Network) thrown around and how you should use it if you’re connecting to a strange WiFi network or you’re conducting sensitive work at the job. The simple answer for what it is and why you should use a VPN is its a private, encrypted, dedicated connection for your internet activity. Read my article on how end-to-end encryption works so you understand why that’s important. VPNs have other …

Categories
Security

How End-to-End Encryption Works

All right. Here’s a simple explanation of how end-to-end encryption works. Recently there’s been a healthy amount of chatter in the news regarding WhatsApp, and i’ve noticed more and more of my contacts using (installing at least) Signal on their phones. This will give you an idea essentially of how our text message convos go when unencrypted and encrypted, and you’ll, hopefully, come away with why it’s important. I’ll probably do a more extensive write-up later …