Fixing Linux
Firefox Multi-Account Containers
Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs that preserve your privacy. Cookies are separated by container, allowing you to use the web with multiple identities or accounts simultaneously.
About This Extension
The Firefox Multi-Account Containers extension lets you carve out a separate box for each of your online lives – no more opening a different browser just to check your work email! Here is a quick video showing you how it works.
Under the hood, it separates website storage into tab-specific Containers. Cookies downloaded by one Container are not available to other Containers. With the Firefox Multi-Account Containers extension, you can…
- Sign in to two different accounts on the same site (for example, you could sign in to work email and home email in two different Container tabs.
- Keep different kinds of browsing far away from each other (for example, you might use one Container tab for managing your Checking Account and a different Container tab for searching for new songs by your favorite band)
- Avoid leaving social-network footprints all over the web (for example, you could use a Container tab for signing in to a social network, and use a different tab for visiting online news sites, keeping your social identity separate from tracking scripts on news sites)
After installing the Firefox Multi-Account Containers extension, click the Containers icon to edit your Containers. Change their colors, names, and icons. Long-click the new tab button to open a new Container tab.
Privacy in Firefox Multi-Account Containers
The Firefox Multi-Account Containers extension does not send any information to Mozilla.
How does this compare to the Facebook Container extension?
Facebook Container specifically isolates Facebook and works automatically. The Firefox Multi-Account Containers is a more general extension that allows you to create containers and determine which sites open in each container. This extension can be customized to suit your needs for multiple sites and multiple logins, but takes more time to set up than Facebook Container.
You can use Multi-Account Containers to create a container for Facebook and assign facebook.com to it. Multi-Account Containers will then make sure to only open facebook.com in the Facebook Container. However, unlike Facebook Container, Multi-Account Containers doesn’t prevent you from opening non-Facebook sites in your Facebook Container. So users of Multi-Account Containers need to take a bit extra care to make sure they leave the Facebook Container when navigating to other sites. In addition, Facebook Container assigns some Facebook-owned sites like Instagram and Messenger to the Facebook Container. With Multi-Account Containers, you will have to assign these in addition to facebook.com.
Facebook Container also deletes Facebook cookies from your other containers on install and when you restart the browser, to clean up any potential Facebook trackers. Multi-Account Containers does not do that for you.
Can I use both Multi-Account Containers and Facebook Container?
Yes, but you need to be a little careful. Don’t use Multi-Account Container to assign facebook.com to a Container, and then try installing Facebook Container. If you a Multi-Account Containers user and want to use both addons, unassign facebook.com, messenger.com, and instagram.com first, then install Facebook Container.
Haven’t I seen this in Firefox before?
Firefox Multi-Account Containers was first introduced as “Containers” available only in Firefox Nightly. It went on to be a Test Pilot Experiment, where we improved the user experience and added new features. Now it exists here as an extension that can be installed by all Firefox users.
Although you can still use the feature built into Firefox Nightly, we recommend using this extension as it has a richer user experience.
Keyboard shortcuts
Ctrl + . (period)
keyboard shortcut is available to open the containers panel. You can then use tab and the enter keys to open new container tabs.
Firefox Add-on Multi-account Containers, Firefox Multi Account Containers Addon, Firefox Multi-account Containers, Firefox Multi-account Containers Extension
Swap File Instead Of A Swap Partition On Linux
How to Move Swap To A File On Your Linux Filesystem
Swap File In Ubuntu, Swap File Linux, Swap File System Linux, Swap File Ubuntu
Swap Partition In Linux, Swap Partition In Ubuntu, Swap Partition On Linux, Swap Partition Type Linux, Swap Partition Ubuntu 16.04, Swap Partition Ubuntu 17.04
The Linux File System – Explained
The Linux File System – Explained
The Linux file system structure can be a bit confusing, simply because I didn’t know anything other than the Windows file system for my entire life. But after persisting through the learning curve, the mystery was unraveled and I can now comfortably switch between Linux and Windows whenever needed, and I actually feel like I understand the Windows file system better now after learning the Linux file system.
For me, the biggest difference between the two file systems is to understand where the root of the file system begins. In Windows, the root begins at the drive letter, usually C:\, which basically means it begins at the hard drive. In Linux however, the root of the file system doesn’t correspond with a physical device or location, it’s a logical location of simply “/”. See the graphics below for a visual representation.
How this helps.
Linux File System Basics, Linux File System Breakdown, Linux File System Explained, Linux File System Explanation, Linux File System Introduction, Linux File System Structure
Run Your Browser In Firejail
Objective
Install Firejail and use it to sandbox applications, like web browsers, that interact with the open Internet.
Distributions
This will work with any current Linux distribution.
Requirements
A working Linux install with root privileges.
Difficulty
Easy
Conventions
- # – requires given command to be executed with root privileges either directly as a root user or by use of
sudo
command - $ – given command to be executed as a regular non-privileged user
Introduction
The single biggest threat to your Linux system is your web browser. When you think about it, it makes perfect sense. A browser is a large and complex piece of software with the ability to execute code, and it accesses the open Internet and executes just about everything that it comes into contact with.
The best way to handle this problem is by compartmentalizing your browser, or any other Internet-facing application, away from the rest of your system. This way, it can’t do nearly as much damage if it is compromised. That’s what Firejail is for. Firejail is a sandboxing program that allows programs to run in individual sandboxes with their own set of parameters, limiting their contact with the rest of your system. Firejail is easy to use, and it’s available in the repositories of nearly every major distribution, except for Fedora and CentOS.
Install Firejail
Debian/Ubuntu
$ sudo apt install firejail
Fedora/CentOS
Download the Firejail .rpm
from their Sourceforge page https://sourceforge.net/projects/firejail/files/firejail/
, and install it manually.
# rpm -i firejail_X.Y-Z.x86_64.rpm
OpenSUSE
# zypper install firejail
Arch Linux
# pacman -S firejail
Gentoo
# emerge --ask firejail
Basic Usage
To run an application through Firejail, you only need to prefix the command with firejail
.
$ firejail firefox
Firefox will start up like it usually would, but contained in it’s own sandbox. This will work with virtually any application that you can think of, including command line ones.
$ firejail tar xpf somefile.tar.gz
Firejail will stay running as long as the application does. Even if you’re using something that’ll be open for a while, you don’t have to worry about Firejail stopping and your application being insecure. Actually, if something like that does happen, the application will stop too. You can also use Firejail along with graphically intensive programs. It won’t slow them down much, if at all.
$ firejail wine64 '~/.wine/drive_c/Program Files (x86)/World of Warcraft/Wow-64.exe'
Passing Arguments
There are tons of features available through flags in Firejail. You probably won’t ever use most of them, but you can certainly check them out in Firejail’s man
page. The couple detailed here are the most common.
–seccomp
The --seccomp
flag tells Firejail to filter out and block any of a number of system calls. It has it’s own default list of system calls that it will block by default, but you can also specify them with --seccomp=syscall,syscall
. Just add --seccomp
to your regular Firejail command to use it.
$ firejail --seccomp firefox
–private
The --private
flag acts sort of like a private window in a web browser does. It creates a separate sandbox in temporary storage and deletes itself after you close the application.
$ firejail --private firefox
Of course, you can string them together.
$ firejail --seccomp --private firefox
Firejail Profiles
Firejail has independent configurations for most of the programs that you’d commonly run it with. It refers to them as, “profiles.” These profiles pass specific flags and bits of configuration to Firejail by default whenever the corresponding program is run. You don’t need to do anything for Firejail to use it’s default profiles. If you want to modify the profiles or create your own, you can copy them into your local directory at ~/.config/firejail/
.
Firejail By Default
There are a few ways to get Firejail to run by default with a program. The easiest is probably to modify the launchers of the programs that you plan to use Firejail with. That can be tedious, though, and you don’t necessarily need to do it. If you want Firejail to run with every program that it has a default profile for, you can run a simple command as root, and Firejail will set itself up.
# firecfg
If you don’t with that wide range of programs using Firejail by default, you can manually set the ones that you want.
# ln -s /usr/bin/firejail /usr/local/bin/firefox
This creates a symbolic link between firejail and the program being run. Substitute the actual path for your system and program.
Closing Thoughts
Firejail is an excellent way to compartmentalize applications on Linux and keep a potential breach quarantined before it even happens. It also has potential for stopping bugs from bringing down more than just the program that they affect. With how easy it is to use, there’s no reason not to run Firejail your system.
Secure Your Linux Desktop with Iptables
Linux may have a reputation for security, but it isn’t perfect. Many distributions also don’t have the best security defaults, so it’s best to implement some best practices for security. One such example is using a firewall.
There are a few options for firewalls in Linux, but most are actually just wrappers around iptables. For this guide we will show you how to work with iptables directly.
What Is Iptables?
Iptables is the Linux kernel firewall. It comes with every Linux distribution, and it’s the most direct way to control traffic coming into and out of your computer.
Iptables has a reputation for being complex, and it can be. You don’t need to know everything about iptables to use it effectively on your desktop, though. You just need some basic knowledge of how it works and how its rules are structured.
Command Structure
All iptables rules follow the same basic structure. Each rule is a single-line command to iptables that tells it how to handle traffic on a specific port. Take a look at the example below:
-A INPUT -i eth0 -p tcp -m state --state ESTABLISHED,RELATED --sport 80 -j ACCEPT
That might look like a lot, but it’s really simple when you break it down. First, this rule begins with -A
because it will append onto your iptables rules.
Next, the -i
flag specifies the interface that the rule is for. In this case, it’s eth0
. When you write your own rules, make sure that you know which interface you’re connected to your network through.
The following flag, -p
, names the protocol. This rule is for tcp
, which is Web traffic.
The -m
flag is a little different. It is used to assert that there is a condition that must be met in order for traffic not to be rejected. The condition in this rule is the state.
State is actually the next flag. You need to give --state
a list of acceptable states written in all caps and separated with commas. This rule accepts both new and established connections.
The second to last flag here is --sport
. It stands for “source port,” and it tells iptables where the traffic is coming from. There is also a --dport
flag that stands for “destination port.” It’s used for OUTPUT
rules for handling which port traffic is arriving from.
Finally, there’s the -j
flag. It tells iptable which action to “jump” to. In this case it should ACCEPT
the traffic that meets the previous conditions.
Keywords:
How To Secure Your Linux Desktop, Linux Securetty, Secure A Linux Server, Secure A Linux System, Secure Linux, Secure Linux Client, Secure Linux Configuration, Secure Linux Desktop, Secure Linux Distro, Secure Linux Embedded, Secure Linux Installation, Secure Linux Iptables, Secure Linux Mint, Secure Linux Os, Secure Linux Ubuntu, Secure Linux Ubuntu Server, Secure Linux Workstation, Secure Uefi Linux