Select the Terminal program from your Linux programs, or press Ctrl+Alt+T on your keyboard. Type date into Terminal and press ↵ Enter. The terminal will display the date in Weekday Month Day Time TimeZone Year format. For example, you might see something like Wed Mar 7 07:38:23 EDT 2017 wherein "EDT" refers to the current time zone (Eastern Daylight Time). Type in cd /usr/share/zoneinfo and press ↵ Enter, then type in tzselect and press ↵ Enter to display a list of locations. The /usr/share/zoneinfo directory may vary depending on your Linux distribution. Type in a selection number that pertains to your general location, then press ↵ Enter. Type in a selection number from the on-screen list and press ↵ Enter. Type in a selection number to select the preferred time zone region and press ↵ Enter. If your city is not listed in the time zone list, pick a different city from your same time zone. In the following prompt, confirm that the local time is correct by typing 1 and then pressing ↵ Enter. If the time isn't correct, type in 2 and press ↵ Enter, then select a new continent and repeat the process. Run the date command again and check that the time zone corresponds to the one you just changed to. If you see you new time zone listed, you have successfully changed your computer's time zone. Most modern distributions have NTP already installed. If your Linux distribution does not, you will need to install the NTP server package. Use the following commands to install it, depending on your Linux distribution:   Ubuntu/Mint/Debian: sudo apt install ntpdate   CentOS: sudo yum install ntpdatesudo /sbin/chkconfig ntpd on   Fedora/RedHat: sudo yum install ntpdatesudo chkconfig ntpd on  Enter ntpdate server link && hwclock –w after the installation command, making sure to enter the link to the website in place of server link.

Summary: Open Terminal. Check your current time zone. Check available time zones. Select a continent or ocean. Select a country. Select a time zone. Confirm the local time. Verify that your time zone has been set. Set your clock to stay synced with internet time servers if you like.


When signing up for an e-mail account or any other account on the internet, make use of all the verification processes it provides. These are usually additional layers of information that is known only to you. The verification processes provided include things such as Phone Verification, SMS Verification and answering specific security questions. Do your research on finding a secure email account, depending on your personal needs; there are reviews available from other users if you do online searches.  Be aware that the email service provider you're using will have its own security measures, hence no particular one is set out here. Simply follow the instructions that are aimed at securing your account as tightly as possible. If you are trying to use an email account that lacks security features, reconsider using it at all. Be aware that no email service is 100 percent safe. Do everything possible to make hacking very difficult. If you include a number with your name or an unusual word, etc., it makes it harder for someone to simply guess your name by adding your first and last names together and emailing. Do not give it to anybody else, do not store it in your email Drafts folder and do not store it where it can be accessed. Your password is valuable, so treat it as such and keep it confidential. Tighten up the security of your account. Add an extra phone number and alternative email address for a password recovery if somehow your account is hacked, and the password has been changed. Add security questions related to password recovery so you can recover your hacked password later on. If you receive a message from your email provider that they are concerned about the email being compromised, follow it up. Read it carefully though, as if the email itself is a scam, it will have giveaway signs such as bad grammar, illegitimate/spoofed logos, a click-on link to change a password (do not click, always change a password from the account itself), etc. If you are suspicious that an email from your email provider isn't real, contact the email company directly, either by phone or by a separate email sent through their actual website. Wait to hear back from them before responding to the suspicious email. Some companies have email abuse or inquiry departments; check their website for more information. If you want an account where you can be less careless, such as for leaving your email address all over the internet, etc., use a separate one intended just for that and leave nothing personal or sensitive on it, ever. Keep your personal email account secure using the suggestions above but also by not giving it to many people, other than those you trust. If you receive emails promising prizes, wins, money exchanges, eternal love, etc., then be very suspicious. Never click on a link promising such things and never reply to the email either. Delete the message without actioning it any further.
Summary: Use a secured email account. Make your email address less easy to guess. Guard your email password. React promptly but carefully to messages about possible attacks to your email account. Consider using different email accounts for different purposes. If it's too good to be true, it's suspicious.