DEL HTML anchors from posts as they are going to be added automaticly with new ssg

This commit is contained in:
Caffeine Fueled 2025-10-27 20:20:04 +01:00
parent 3484b45045
commit 3d28d5eee9
Signed by: cf7
GPG key ID: CA295D643074C68C
26 changed files with 263 additions and 263 deletions

View file

@ -6,13 +6,13 @@ Let me start with; **there is no perfect security**. Your goal is to make it as
I keep it as short as possible and focus on the 'what' and 'why', not the 'how'. There are many ways to achieve the goals, but this is a topic for itself, and depends on the circumstances.
## "I am not a target" <a href="#i-am-not-a-target" id="i-am-not-a-target">#</a>
## "I am not a target"
Unfortunately, anyone is, and yes, ANYONE can become a victim of a cybercrime. Cybercrime is highly lucrative, and criminals become more creative every year. Automation makes it simple to find easy targets or attack a large group of targets.
I'll try to provide you with enough information for safe internet use. If you feel overwhelmed, tackle one topic at a time, and keep improving. **It is never too late to care about your online security**.
## TLDR - 5 most crucial tips <a href="#tldr" id="tldr">#</a>
## TLDR - 5 most crucial tips
If you only take away these five things, I will be more than happy. These steps alone take your security to the next level and are crucial. I'll go into more detail later in the post.
@ -50,7 +50,7 @@ Answering security questions truthfully makes you vulnerable to social engineeri
---
## Password Security <a href="#password-security" id="password-security">#</a>
## Password Security
**Summarized: Generate and store a random and unique 16+ characters password for every account in your password manager.**
@ -102,7 +102,7 @@ It does not hurt to change passwords regularly, but it is not worth the hassle,
---
## Multi-/2-factor authentication <a href="#mfa" id="mfa">#</a>
## Multi-/2-factor authentication
This authentication method requires the user to provide two or more factors to access the desired service. Those factors can be: **knowledge** (something you know (e.x. pin, password, security question)), **possession** (something you have (e.x. security token, security key, second device)), and **inherence** (something you are (e.x. fingerprint, iris)).
@ -161,7 +161,7 @@ PIN:
**Important**: I cannot stress enough how important backups are. Even though MFA is a must and brings your online security to the next level, there is a legit risk of getting locked out if you lose access to the second factor.
## Do not overshare <a href="#over-sharing" id="over-sharing">#</a>
## Do not overshare
I might be paranoid, but the internet can be a dangerous place. As the police would say: '**everything you say can and will be used against you**'. This section relates to targeted rather than automated attacks.
@ -172,7 +172,7 @@ Something you can do is **lie, share wrong information about yourself, use an a
Be skeptical and keep in mind: **the internet does not forget**.
## Check twice, click once <a href="#check-twice" id="check-twice">#</a>
## Check twice, click once
The best security strategy is worthless if someone clicks and downloads anything negligently.
@ -184,7 +184,7 @@ To provide some examples: 2 ways to deal with suspicious messages would be to, f
Being careful is an important part of being secure online.
## Secure your device <a href="#secure-device" id="secure-device">#</a>
## Secure your device
**Keep your operating system, browser, antivirus, and everything else up-to-date**. I cannot stress enough how important that is.
@ -202,7 +202,7 @@ Do your research. There are good and bad VPN providers, and NEVER use free VPN o
In the end, I have to mention **Tor**. Tor routes your traffic through of network of nodes and makes it almost to track back. It is an important tool, but I am afraid that a detailed description is out of the scope of this post.
## Conclusion <a href="#conclusion" id="conclusion">#</a>
## Conclusion
So, I hope I could provide some new ideas on how to protect your online activity. Just start with the five most important points that I showed at the start, and tackle other topics later. And keep in mind, there is no perfect security, just making it more complex, and limiting the damage in case of a security incident.