Story image

NordVPN launches dedicated Linux app

04 Sep 2018

NordVPN has announced a release of an app dedicated for Linux users.

The new Linux app is meant to bring VPN (Virtual Private Network) services to a larger audience by presenting a product that combines ease of use and setup with advanced security and privacy. 

NordVPN chief marketing officer Marty P. Kamden says, “We have a strong belief that online privacy and security should be accessible to everyone with a connected device, no matter what operating system they are using.”

“Most VPN providers offer Linux connectivity without the app support, and that is not always the easiest way, especially for beginners.

He adds, "That's why we did our best to create a simple app with minimum setup, dedicated especially for Linux users.”

With the dedicated NordVPN app for Linux, users will be able to access geoblocked content, evade censorship or government surveillance, and find the best international deals.

NordVPN will also provide security and privacy features like CyberSec or Kill Switch, which have not been available to Linux users before.

More features will be added in the future to bring Linux users the same experience that NordVPN customers can enjoy on other platforms.

Main features of the NordVPN app for Linux:

  • Access the NordVPN service on up to 6 devices with 1 account
  • 4901 servers in 62 countries
  • Instant connection (just type ‘nordvpn connect’)
  • No graphic distractions, only the power of Linux commands
  • Internet protocols depending on user’s needs: connection speed (UDP) or level of security (TCP)
  • CyberSec and Kill Switch features
  • 24/7 customer support​

NordVPN Linux app commands

login                          Logs the user in

connect, c                Connects the user to VPN

disconnect, d        Disconnects the user from VPN

set, s                          Sets a configuration option

settings                    Lists the current settings

status                        Shows the connection status

refresh                     Refreshes the server list

countries                Prints the country list

logout                       Logs the user out

help, h                      Shows a list of commands or help for one command

One NordVPN account can be used to secure up to six devices simultaneously.

NordVPN also offers dedicated applications for Windows, macOS, iOS and Android, as well as browser extensions for Chrome and Firefox.

The NordVPN app for Linux is available for download online.

NordVPN prides itself on being a VPN service provider that is more security oriented than most VPN services.

It offers double VPN encryption, ad blocking and Onion Over VPN. 

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.