Story image

NordVPN launches dedicated Linux app

04 Sep 18

NordVPN has announced a release of an app dedicated for Linux users.

The new Linux app is meant to bring VPN (Virtual Private Network) services to a larger audience by presenting a product that combines ease of use and setup with advanced security and privacy. 

NordVPN chief marketing officer Marty P. Kamden says, “We have a strong belief that online privacy and security should be accessible to everyone with a connected device, no matter what operating system they are using.”

“Most VPN providers offer Linux connectivity without the app support, and that is not always the easiest way, especially for beginners.

He adds, "That's why we did our best to create a simple app with minimum setup, dedicated especially for Linux users.”

With the dedicated NordVPN app for Linux, users will be able to access geoblocked content, evade censorship or government surveillance, and find the best international deals.

NordVPN will also provide security and privacy features like CyberSec or Kill Switch, which have not been available to Linux users before.

More features will be added in the future to bring Linux users the same experience that NordVPN customers can enjoy on other platforms.

Main features of the NordVPN app for Linux:

  • Access the NordVPN service on up to 6 devices with 1 account
  • 4901 servers in 62 countries
  • Instant connection (just type ‘nordvpn connect’)
  • No graphic distractions, only the power of Linux commands
  • Internet protocols depending on user’s needs: connection speed (UDP) or level of security (TCP)
  • CyberSec and Kill Switch features
  • 24/7 customer support​

NordVPN Linux app commands

login                          Logs the user in

connect, c                Connects the user to VPN

disconnect, d        Disconnects the user from VPN

set, s                          Sets a configuration option

settings                    Lists the current settings

status                        Shows the connection status

refresh                     Refreshes the server list

countries                Prints the country list

logout                       Logs the user out

help, h                      Shows a list of commands or help for one command

One NordVPN account can be used to secure up to six devices simultaneously.

NordVPN also offers dedicated applications for Windows, macOS, iOS and Android, as well as browser extensions for Chrome and Firefox.

The NordVPN app for Linux is available for download online.

NordVPN prides itself on being a VPN service provider that is more security oriented than most VPN services.

It offers double VPN encryption, ad blocking and Onion Over VPN. 

Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
Dell EMC advances hybrid cloud for VMware environments
Through collaboration and joint engineering, Dell EMC and VMware are enabling organisations to derive more value from IT investments.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.