Table of Contents
The browser stands between us and the internet. It determines how we experience the internet by interpreting the files sent by the websites we visit. We can also add custom capabilities to the browser by using addons. For example, we can block trackers and remove advertisements and other unwanted elements from websites. It is even possible to change the colors of websites on the fly. With these features, we can improve productivity, privacy, and security when surfing the web.
Next, we discuss browser preferences, addons, and how to use the browser effectively.
To effectively use the browser, we need to learn to use tabs, search bar, and bookmarks. We can open a new tab with
Ctrl + T, close the current tab with
Ctrl + W, and switch tabs with
Ctrl + Tab.
The search bar is perhaps the most useful feature of the browser, as it is what allows us to browse the website. We can focus the text cursor on the search bar using
Ctrl + L. By typing text on the search bar, it suggests websites based on your bookmarks. We recommend disabling the top site and history suggestions from the preferences. We can also type
@<name> to use any installed search engine directly. We recommend using privacy-focused search engines to avoid filter bubbles created by personalized search results from search companies that track your data.
We can save websites for later use using bookmarks.
Ctrl + B shows the bookmarks bar, and
Ctrl + D bookmarks the current page. However, you should use Pocket instead of bookmarks to save consumable content such as articles and videos or subscribe to recurrent content using RSS feeds. We discuss more about managing digital media on the Digital Media page.
We will mention browser addons for other applications later as we discuss them.
Emails have two purposes: security and communication. Here is how to set up two separate emails to tackle both of them.
First, we create a new Protonmail address as our secure email. We use the secure email for registering accounts and as a backup email for resetting passwords. We should open the secure email only when we need to use it and otherwise keep it logged out. We should also keep the secure email address private to avoid targeted attacks like phishing.
Second, we create a new email address as our communication email. I recommend Hey, but a second Protonmail address also works fine. We use the communication email for all personal and business communication, receive email notifications, and newsletters. Since we want to keep the communication email continuously open to receive and read messages, we should avoid registering security-critical accounts to the communication email.
Everyone should use a password manager for managing user credentials such as usernames and passwords. Password managers improve security by enabling the user to generate, use, and manage strong, unique passwords instead of reusing similar, weak passwords. We should also use two-factor authentication for all security-critical services. Many online password managers have a two-factor authentication application and allow backup. You must register your online password manager to your secure email!
We need to create strong and easy-to-memorize master passwords for the password manager, email, and operating system. We can use the password generator in LastPass to generate pronounceable, at least 16 characters long, lower-case only, passwords. If needed, we can modify the generated password by adding numbers, upper case characters, or special characters. Pronounceable passwords are easier to memorize and type.
Next, we need to memorize the password. One method for memorizing is to create an encrypted container such as the KeePass database with the password and periodically recalling the password from memory by opening it. It typically takes a couple of days to memorize new passwords. Once you have learned the password, you can use it for the intended service.
Virtual Private Network
We can further improve privacy and security by using a virtual private network (VPN). VPN hides the device’s IP address by routing the traffic through one of their servers and encrypts the communication between the device and the server. Encryption improves security when we are using public networks. VPNs also allow circumventing geoblocking by selecting servers located in different countries. When choosing a VPN provider, we need to pay attention to the company’s policy and the country’s legislation. For example, their policy should include not keeping any logs of traffic and allow peer-to-peer traffic.
Many people might falsely believe that their computer’s password protects their data and files. However, the operating system password protects against unauthorized network access, but not the data on the computer’s hard drives. In other words, an outsider could access your files by removing the hard drives and connecting them to another computer. However, we can secure the hard drives' data by using encryption. Without knowing the encryption key, the outsider could access unusable encrypted data, not the actual files. We can use a disk encryption utility to create full disk encryption or virtual encrypted disks for encryption.
Full disk encryption is suitable for portable devices such as laptops and thumb drives, which are susceptible to being lost and risk losing confidential information. The benefit of full disk encryption is that it encrypts all data on the device automatically. However, the downside is that encryption requires computation, which decreases performance for I/O heavy operations.
Virtual encrypted disks are technically easier to use and suitable when fully encrypting hard drives is not feasible for technical or performance reasons. Disk encryption utilities create them as binary files that contain the encrypted data. When mounted, they act in the same way as regular disks, in which we can store confidential files. There is a performance decrease only when operating inside the encrypted disk.
Kanban is a popular project management system. It originates from lean manufacturing and has become popular in Agile software development, but it works well for managing tasks for knowledge work in general. Kanban’s core principles are visualizing your work, limiting your work in process, and focusing on flow.
The Kanban board consists of columns, cards, members and optionally a timer. Each card represents a task in the project, and each column represents the state of a task. We move the cards from left to right in columns to visualize work progress. The columns in a standard board are To-Do, Work in Progress, and Done. We can limit the number of tasks in the Work in Progress column to avoid multitasking. Each card has the following attributes: Title, description, due date, subtasks, color to indicate task type, label to classify task, and members assigned to the task. Subtasks should be so simple that they do not warrant a new Kanban card.
We can measure the time to complete a task using the timer and use the measurements to estimate the future workload of similar tasks. We recommend using a timer only for repetitive mechanic tasks because time pressure seems to have an unfavorable effect on creativity.