On Sat, May 14, 2022 at 03:05:11PM +1200, Ash Joubert wrote:
> On 14/05/2022 00:42, Michael Stone wrote:
> > On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
> > > A loong password is not "equivalent" to 2FA, that's right. Good
> > > password management (of which length is but a pa
On Sat, May 14, 2022 at 02:40:53PM +1200, Ash Joubert wrote:
> On 13/05/2022 12:23, Nicholas Geovanis wrote:
> > That's the value added in exchange for Ash's "massive pain in the arse".
> > Just making the 1st factor be
> > a loong password is not equivalent to 2FA in any way. Machine reaching back
On Fri, May 13, 2022 at 05:27:30PM -0400, Greg Wooledge wrote:
> On Fri, May 13, 2022 at 03:39:39PM -0500, David Wright wrote:
> > But the next paragraph talks of the file "/etc/resolvconf.conf",
> > which has nothing to do with the resolvconf /package/, but is the
> > configuration file for the /o
On Fri 13 May 2022 at 20:49:27 (-0400), Greg Wooledge wrote:
> On Fri, May 13, 2022 at 05:27:30PM -0400, Greg Wooledge wrote:
> >
> > If my BEST EFFORTS fall that far short, then whatever. Maybe instead
> > of berating the wiki and the hard-working editors who TRIED OUR DAMNED
> > BEST to figure
On Fri 13 May 2022 at 17:27:30 (-0400), Greg Wooledge wrote:
> On Fri, May 13, 2022 at 03:39:39PM -0500, David Wright wrote:
> > But the next paragraph talks of the file "/etc/resolvconf.conf",
> > which has nothing to do with the resolvconf /package/, but is the
> > configuration file for the /ope
On Sat, 14 May 2022 at 13:54, ghe2001 wrote:
> On Friday, May 13, 2022 8:37 PM, David wrote:
>
> > Hi, you could try the more recent version of smartmontools
> > (7.2-1~bpo10+1) that is available in the buster-backports
> > repository.
> >
> > Version 6.6 was released 2017-November-05.
> > Versio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
‐‐‐ Original Message ‐‐‐
On Friday, May 13, 2022 8:37 PM, David wrote:
> Hi, you could try the more recent version of smartmontools
> (7.2-1~bpo10+1) that is available in the buster-backports
> repository.
>
> Version 6.6 was released 20
On 5/13/22 19:02, ghe2001 wrote:
Supermicro workstation, Debian Buster, smartctl v 6.6
I bought a new 12TB Western Digital Gold SATA disk the other day. After
testing it, smartctl says, among other things:
22 Unknown_Attribute 0x0023 001 001 025Pre-fail Always
FAILING_NO
On 14/05/2022 00:42, Michael Stone wrote:
On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
A loong password is not "equivalent" to 2FA, that's right. Good
password management (of which length is but a part) is as secure
as 2FA.
No, it really isn't.
A good password will not p
On 13/05/2022 12:23, Nicholas Geovanis wrote:
That's the value added in exchange for Ash's "massive pain in the arse".
Just making the 1st factor be
a loong password is not equivalent to 2FA in any way. Machine reaching back
to you is the difference.
There are attacks that 2FA can defeat, espec
On 5/13/2022 6:53 PM, David wrote:
On Sat, 14 May 2022 at 10:57, Matt Ventura wrote:
On one box (Debian 11.3), my virt-install script works fine:
virt-install [...]
However, on another box, the same command (minus the final --network option)
gives me this:
[...]
Could not open '/var/lib/lib
On Sat, 14 May 2022 at 12:21, ghe2001 wrote:
> Supermicro workstation, Debian Buster, smartctl v 6.6
>
> I bought a new 12TB Western Digital Gold SATA disk the other day.
> After testing it, smartctl says, among other things:
>
> 22 Unknown_Attribute 0x0023 001 001 025Pre-fail A
On Sat, 14 May 2022 at 10:57, Matt Ventura wrote:
> On one box (Debian 11.3), my virt-install script works fine:
> virt-install [...]
> However, on another box, the same command (minus the final --network option)
> gives me this:
[...]
> Could not open '/var/lib/libvirt/qemu/nvram/openwisp_VARS
Hi,
On one box (Debian 11.3), my virt-install script works fine:
virt-install --virt-type kvm --name $NEWVM
--locationhttp://ftp.us.debian.org/debian/dists/bullseye/main/installer-amd64
--extra-args "netcfg/hostname=$NEWVM" -v \
--os-variant debian11 --disk
size=30,pool=vmvol,bus=scsi,disca
On Fri, May 13, 2022 at 05:27:30PM -0400, Greg Wooledge wrote:
>
> If my BEST EFFORTS fall that far short, then whatever. Maybe instead
> of berating the wiki and the hard-working editors who TRIED OUR DAMNED
> BEST to figure this shit out and document it for the world, you could,
> like, help ou
On Sat, 14 May 2022 at 04:40, Brian wrote:
> On Fri 13 May 2022 at 20:01:20 +0200, Kamil Jońca wrote:
> > Brian writes:
> > > On Fri 13 May 2022 at 08:42:21 -0400, Michael Stone wrote:
> > >> On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
> > >> > A loong password is not "equi
On Wed, May 11, 2022 at 5:33 PM David Christensen wrote:
> On the few occasions that I have tried Debian on recent hardware, I have
> found that Debian Stable may not support it. One possibility is to try
> Debian Testing. (That is how I ran this Intel DQ67SW / Core i7-2600S
> computer when it wa
On 5/13/22 12:02, Greg Wooledge wrote:
On Fri, May 13, 2022 at 11:53:23AM -0700, David Christensen wrote:
On 5/13/22 09:02, Richmond wrote:
stat /etc/resolv.conf shows that the file has been updated but its
content doesn't change.
My /etc/resolv.conf did not change after running Network Manag
On Fri, May 13, 2022 at 03:39:39PM -0500, David Wright wrote:
> But the next paragraph talks of the file "/etc/resolvconf.conf",
> which has nothing to do with the resolvconf /package/, but is the
> configuration file for the /openresolv/ package.
What? WHAT?!?
You know, I REALLY TRY.
If my BES
On 5/13/22 13:06, KCB Leigh wrote:
> I really want to thank you all for this advice: it solved a problem
with which I've been struggling for MONTHS!!
>
> My Computer: ACER ASPIRE 514-54
> BIOS/UEFI SETUP:INSYDE vers. 1.17
> Internal Storage:
> - HDD0: 256GB Western Digital WDC PC SN530
On Fri 13 May 2022 at 15:02:35 (-0400), Greg Wooledge wrote:
> On Fri, May 13, 2022 at 11:53:23AM -0700, David Christensen wrote:
> > On 5/13/22 09:02, Richmond wrote:
> > > stat /etc/resolv.conf shows that the file has been updated but its
> > > content doesn't change.
> >
> > My /etc/resolv.conf
Message-id: <[🔎] alpine.DEB.2.21.2205121632130.1910@Asus1>
In-reply-to: <[🔎]
CAP1wdQsgJZY9x=8+olbyxjgguxjfdastne0yyyg1mh3jic8...@mail.gmail.com>
References: <[🔎]
CAP1wdQs=a4HhZV4k8PG=_rjoxlht4pnm9h69ungatahxusy...@mail.gmail.com> <[🔎]
d93c2fb1-7ec4-2935-7855-0b6f68bf0...@holgerdanske.com> <[🔎]
David Christensen writes:
> On 5/13/22 09:02, Richmond wrote:
>> David Christensen writes:
>>> On 5/12/22 07:17, Richmond wrote:
David Christensen writes:
> On 5/11/22 06:55, Richmond wrote:
>> I have a network manager applet on my xfce4 desktop. I am logged in as a
>> non root u
Brian writes:
[...]
> When was the last time you experienced that or heard of a well-documented
> case of it happening?
I do not know what you mean "well documented"
https://haveibeenpwned.com/ is enough?
> I do not even know what my passwords are.
Does not matter. I also know very few my pass
On Fri, May 13, 2022 at 11:53:23AM -0700, David Christensen wrote:
> On 5/13/22 09:02, Richmond wrote:
> > stat /etc/resolv.conf shows that the file has been updated but its
> > content doesn't change.
>
> My /etc/resolv.conf did not change after running Network Manager; it changed
> after rebooti
On 5/13/22 09:02, Richmond wrote:
David Christensen writes:
On 5/12/22 07:17, Richmond wrote:
David Christensen writes:
On 5/11/22 06:55, Richmond wrote:
I have a network manager applet on my xfce4 desktop. I am logged in as a
non root user, and I can select edit connections and change the IP
On Fri 13 May 2022 at 20:01:20 +0200, Kamil Jońca wrote:
> Brian writes:
>
> > On Fri 13 May 2022 at 08:42:21 -0400, Michael Stone wrote:
> >
> >> On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
> >> > A loong password is not "equivalent" to 2FA, that's right. Good
> >> > passw
Brian writes:
> On Fri 13 May 2022 at 08:42:21 -0400, Michael Stone wrote:
>
>> On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
>> > A loong password is not "equivalent" to 2FA, that's right. Good
>> > password management (of which length is but a part) is as secure
>> > as 2FA.
On Fri 13 May 2022 at 08:42:21 -0400, Michael Stone wrote:
> On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
> > A loong password is not "equivalent" to 2FA, that's right. Good
> > password management (of which length is but a part) is as secure
> > as 2FA.
>
> No, it really isn
From: Reco
Date: Thu, 7 Sep 2017 09:53:12 +0300
> If either of these show something - you're in luck, your hardware is
> supported, etc.
> If not - I'm out of ideas, sorry.
The original objective was to take the VGA output from a JVC camera
and convert it to a digital image in a commonly
test (failure)
David Christensen writes:
> On 5/12/22 07:17, Richmond wrote:
>> David Christensen writes:
>>
>>> On 5/11/22 06:55, Richmond wrote:
I have a network manager applet on my xfce4 desktop. I am logged in as a
non root user, and I can select edit connections and change the IPv4
settin
On Fri 13 May 2022 at 14:02:40 (+0200), to...@tuxteam.de wrote:
> On Fri, May 13, 2022 at 11:44:52AM -, Curt wrote:
> > On 2022-05-13, wrote:
> > >
> > >> > It's just the basic antipattern you can see everywhere in surveillance
> >
> > >> You seem to be seeing these antipatterns at the drop
On Fri 13 May 2022 at 16:19:52 (+0200), Hans wrote:
> Am Freitag, 13. Mai 2022, 13:21:17 CEST schrieb Stefan Krusche:
>
> I believe, changing the ifup-script might be a good idea. Additionally I will
> try to set the environment variable in /etc/default/macchanger to my needs.
>
> At the moment
Am Freitag, 13. Mai 2022 schrieb Hans:
> In the meantime I filed a buugreport to it, because as we see,
> macchanger does not do its job by default as intended.
Yes, it is a bug. It has already been reported in 2015. I referenced
that in my other message:
https://bugs.debian.org/cgi-bin/bugrepor
Am Freitag, 13. Mai 2022, 13:21:17 CEST schrieb Stefan Krusche:
Hi Stefan,
I believe, changing the ifup-script might be a good idea. Additionally I will
try to set the environment variable in /etc/default/macchanger to my needs.
At the moment I am using a random MAC set by network-manager, but
On Fri, May 13, 2022 at 07:16:11AM +0200, to...@tuxteam.de wrote:
A loong password is not "equivalent" to 2FA, that's right. Good
password management (of which length is but a part) is as secure
as 2FA.
No, it really isn't.
On Fri, May 13, 2022 at 11:44:52AM -, Curt wrote:
> On 2022-05-13, wrote:
> >
> >> > It's just the basic antipattern you can see everywhere in surveillance
>
> >> You seem to be seeing these antipatterns at the drop of any hat.
> >
> > Uh -- whatever you mean to say with that.
>
> I meant t
On 2022-05-13, wrote:
>
>> > It's just the basic antipattern you can see everywhere in surveillance
>> You seem to be seeing these antipatterns at the drop of any hat.
>
> Uh -- whatever you mean to say with that.
I meant that you applied (or employed) the term quite recently in a
completely un
On Fri, May 13, 2022 at 09:36:13AM -, Curt wrote:
> On 2022-05-13, wrote:
> >
> > It's just the basic antipattern you can see everywhere in surveillance
>
> You seem to be seeing these antipatterns at the drop of any hat.
Uh -- whatever you mean to say with that.
[...]
> I guess the devil
Am Freitag, 13. Mai 2022 schrieb Stefan Krusche:
> When $IFACE == "--all" which is a valid option for ifup as David
> pointed out then macchanger fails and reports the above error message
> to its logfile because macchanger understands "--all" as on option
> which it doesn't know.
See also:
https:
Good Day Everyone,
Am Montag, 9. Mai 2022 schrieb Hans:
> IFACE = --all
> /usr/bin/macchanger: unrecognized option '--all'
> GNU MAC Changer
Yes. The problem is that the script /etc/macchanger/ifupdown.sh which is
shipped with the macchanger package processes $IFACE without checking
its value.
Good Day Everyone,
Am Montag, 9. Mai 2022 schrieb Hans:
> IFACE = --all
> /usr/bin/macchanger: unrecognized option '--all'
> GNU MAC Changer
Yes. The problem is that the script /etc/macchanger/ifupdown.sh which is
shipped with the macchanger package processes $IFACE without checking
its value.
On 2022-05-13, wrote:
>
> It's just the basic antipattern you can see everywhere in surveillance
You seem to be seeing these antipatterns at the drop of any hat.
But I read recently about a brand new password antipattern (whatever those are).
The only thing is, I don't really understand what th
Virgo Pärna writes:
> On Thu, 12 May 2022 20:59:16 +0200, Fero Dali wrote:
>> On Thu, May 12, 2022 at 8:08 PM Virgo Pärna wrote:
>>>
>>> Tried rechecking all mails, but did not find that mail. TOTP
>>> based twofactor can be used even without phone app.
>>
>> I made a mistake and replie
45 matches
Mail list logo