Story image

NordVPN launches dedicated Linux app

04 Sep 18

NordVPN has announced a release of an app dedicated for Linux users.

The new Linux app is meant to bring VPN (Virtual Private Network) services to a larger audience by presenting a product that combines ease of use and setup with advanced security and privacy. 

NordVPN chief marketing officer Marty P. Kamden says, “We have a strong belief that online privacy and security should be accessible to everyone with a connected device, no matter what operating system they are using.”

“Most VPN providers offer Linux connectivity without the app support, and that is not always the easiest way, especially for beginners.

He adds, "That's why we did our best to create a simple app with minimum setup, dedicated especially for Linux users.”

With the dedicated NordVPN app for Linux, users will be able to access geoblocked content, evade censorship or government surveillance, and find the best international deals.

NordVPN will also provide security and privacy features like CyberSec or Kill Switch, which have not been available to Linux users before.

More features will be added in the future to bring Linux users the same experience that NordVPN customers can enjoy on other platforms.

Main features of the NordVPN app for Linux:

  • Access the NordVPN service on up to 6 devices with 1 account
  • 4901 servers in 62 countries
  • Instant connection (just type ‘nordvpn connect’)
  • No graphic distractions, only the power of Linux commands
  • Internet protocols depending on user’s needs: connection speed (UDP) or level of security (TCP)
  • CyberSec and Kill Switch features
  • 24/7 customer support​

NordVPN Linux app commands

login                          Logs the user in

connect, c                Connects the user to VPN

disconnect, d        Disconnects the user from VPN

set, s                          Sets a configuration option

settings                    Lists the current settings

status                        Shows the connection status

refresh                     Refreshes the server list

countries                Prints the country list

logout                       Logs the user out

help, h                      Shows a list of commands or help for one command

One NordVPN account can be used to secure up to six devices simultaneously.

NordVPN also offers dedicated applications for Windows, macOS, iOS and Android, as well as browser extensions for Chrome and Firefox.

The NordVPN app for Linux is available for download online.

NordVPN prides itself on being a VPN service provider that is more security oriented than most VPN services.

It offers double VPN encryption, ad blocking and Onion Over VPN. 

ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.
Companies swamped by critical vulnerabilities – Tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”
Three access management trends making waves in APAC
Consumer identity proofing, authentication, and authorisation will top the $37 billion value mark by 2023.
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”