Security tools for GNU / Linux for everyday use

Hardware security padlocked circuit

There are distributions loaded with hundreds or more than a thousand tools for security and to carry out audits, such as the well-known Kali Linux, DEFT, Parrot Security, etc., we have already dedicated different articles to them and you should know them well, but now we are going to talk about other tools that, far from being specific for security experts, they can help us improve our own on a day-to-day basis, all of them available for our preferred distribution ...

That is, we are going to expose a list of tools that could help us perform tasks that will improve security on our network or system:

  1. CIRClean: tool for USB storage drives that can help us clean documents on these types of drives.
  2. Buttercup: multiplatform password manager that will help us keep our passwords safe and not forget about them.
  3. KeePaasXC: It is another tool that we already dealt with in LxA, to manage passwords like the previous one, therefore it is a good alternative ...
  4. LMD: is the acronym for Linux Malware Detect and as its name suggests it is a scanner to help us detect malware that can be run on Linux-based systems.
  5. Loki- This is a file scanner to check for so-called COIs.
  6. ClamAV: it is the famous multiplatform antivirus that allows you to scan malware and also add your own signatures, something that the most famous antivirus with which it competes does not allow. Do not forget to complement it with anti rootkit.
  7. BleachBit: another of the tools that we have talked about in this blog, a tool to clean the system and maintain privacy, since it can delete cookies, histories, etc.

As you see it is about simple tools that security experts use but that we can also use for day to day, securing our system and data.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Isaac said

    Hello,

    First of all, thank you for following our blog. And secondly, congratulations on finding the copy and thank you very much for reporting it.

    Greetings from LxA !!!