Creating an encrypted volume

First, use parted -a optimal /dev/sdb to prepare a disk:
print
mklabel gpt
mkpart primary 0% 100%
print
quit
  
Second, encrypt the /dev/sdb1 device:
sudo cryptsetup luksFormat /dev/sdb1
sudo cryptsetup luksOpen /dev/sdb1 datadrive
sudo mkfs -t ext4 -L DATA3 /dev/mapper/datadrive
  

Links: 1,2.

DOES NOT WORK FOR ME! Blocking access to some websites

    su
    apt-get install squidguard
    mkdir custom;cd custom/;emacs -nw domains
  

Now, enter your domains in the following format:

domain1.com
domain2.org
domain3.net

Then,

chown proxy:proxy /etc/squidguard/squidGuard.conf
    chown -R proxy:proxy /var/lib/squidguard/db    
    chown -R proxy:proxy /var/log/squidguard
    emacs -nw  /etc/squidguard/squidGuard.conf  

Here is an example of the configuration:

dbhome /var/lib/squidguard/db
logdir /var/log/squidguard
dest custom {
        domainlist custom/domains
        }

acl {
        default {
                pass !custom all
                redirect http://localhost/block.html
        }
 }
    
Now,
      squidGuard -C all -d
            
      

References:

Admin Ideas

HDD partitioning schema for 8TB HDD and 500GB SSD

part namesizedesc
/0.5TBSSD as a system root
8TB HDD
/mnt/dat4TBData volume: storing static data, source data, resulting data, archived documents and data (papers, books, etc).
/mnt/opr3.5TBOperational volume: dynamic data, data processing, intermediate files, and preliminary results.
/mnt/prs0.5TBProjects: source code, documents, proposals, ideas,graphic editing, etc..