On Monday 02 Jun 2014 15:17:10 Stroller wrote:
> On Sat, 31 May 2014, at 4:22 pm, Mick wrote:
> > I am using tmux and find it convenient especially for managing remote
> > sessions, but I have noticed that the commands running in a session shown
> > at the bottom right hand side, within the status
Am 02.06.2014 16:52, schrieb J. Roeleveld:
> On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
>> On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
>>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
> On Mon, 02 Jun 2014
On Monday, June 02, 2014 07:14:27 PM Volker Armin Hemmann wrote:
> Am 02.06.2014 13:28, schrieb Rich Freeman:
> > On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
> >> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> >>> The second option does sound what I am looking for. Basically, if I log
Am 02.06.2014 13:28, schrieb Rich Freeman:
> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>>
>>> The second option does sound what I am looking for. Basically, if I log
>>> out but leave my computer on, leave home, some crook/NSA type bre
Am 02.06.2014 12:56, schrieb Neil Bothwick:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>
>> The second option does sound what I am looking for. Basically, if I log
>> out but leave my computer on, leave home, some crook/NSA type breaks in
>> and tries to access something or steals my whole
On Sat, 31 May 2014, at 4:22 pm, Mick wrote:
>
> I am using tmux and find it convenient especially for managing remote
> sessions, but I have noticed that the commands running in a session shown at
> the bottom right hand side, within the status line, are too short. Can I
> extend the number
So you backup on harddrive, not tape and theses are not incremental
backups.
But my question about backup was not only for you but for all that
encrypt their servers.
The backup part is generally the weakest point.
Le 2014-06-02 13:58, Matti Nykyri a écrit :
On Jun 2, 2014, at 15:36, godzi
On Monday, June 02, 2014 04:23:07 PM Matti Nykyri wrote:
> On Jun 2, 2014, at 17:52, "J. Roeleveld" wrote:
> > On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
> >> On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
> >>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
> On Mon
On Mon, Jun 2, 2014 at 8:06 AM, Dale wrote:
> Now that is wicked. Like I said, this could get crazy.
Meh. I don't encrypt my disks for desktops at home. My Chromebook
comes encrypted out-of-the-box (no doubt the NSA can have it unlocked
on request). If I had any other laptops I'd probably use
On Jun 2, 2014, at 17:52, "J. Roeleveld" wrote:
> On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
>> On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
>>> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
> On Mon, 02 J
On Jun 2, 2014, at 15:36, godzil wrote:
> Le 2014-06-02 13:23, Matti Nykyri a écrit :
>> On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
>> Well i have a switch in the door of the server room. It opens when you
>> open the door. That signals the kernel to wipe all the encryption keys
>> from ker
On Monday, June 02, 2014 03:23:03 PM Matti Nykyri wrote:
> On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
> > On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
> >> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
> >>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> The second
Le 2014-06-02 13:23, Matti Nykyri a écrit :
On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
Well i have a switch in the door of the server room. It opens when you
open the door. That signals the kernel to wipe all the encryption keys
from kernel memory. Without the keys there is no access to t
On Jun 2, 2014, at 15:06, Dale wrote:
> Rich Freeman wrote:
>> If you're worried about casual thieves then just about any kind of
>> properly-implemented encryption will stop them.
>>
>> If you're worried about a government official specifically tasked with
>> retrieving your computer, my unders
> I might add, on a older rig I tried that command once. I ran rm -rfv /*
> and it didn't erase everything like I thought it would. I figured the
> command would be loaded in ram and would run until the end of the /
> structure. It didn't. I can't recall how far it got now but I think it
> was
On Mon, 2 Jun 2014 19:34:40 +0800, Mark David Dumlao wrote:
> > Definitely dm-crypt/LUKS for partitions/devices, but why use encfs
> > which needs FUSE, when ecryptfs does the same thing in kernel space?
> for dual-boot systems, or simply from the point of system recovery, I
> find it really attr
On Jun 2, 2014, at 16:40, "J. Roeleveld" wrote:
> On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
>> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
>>> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
The second option does sound what I am looking for. Basically, if I log
>>>
Rich Freeman wrote:
> If you're worried about casual thieves then just about any kind of
> properly-implemented encryption will stop them.
>
> If you're worried about a government official specifically tasked with
> retrieving your computer, my understanding is that it is SOP these
> days to retrie
On Monday, June 02, 2014 07:28:53 AM Rich Freeman wrote:
> On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
> > On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> >> The second option does sound what I am looking for. Basically, if I log
> >> out but leave my computer on, leave home, some croo
On Mon, Jun 2, 2014 at 5:20 PM, Neil Bothwick wrote:
> On Mon, 02 Jun 2014 10:53:51 +0200, Michael Hampicke wrote:
>
>> > I'm considering encrypting my home partition one of these days. Given
>> > the things that have come out in recent months, back doors and such,
>> > what is a good program/sof
Neil Bothwick wrote:
> On Mon, 02 Jun 2014 06:04:44 -0500, Dale wrote:
>
>> That said, my UPS claims it will run for about a hour or so. They could
>> go quite a ways around here in a hour.
> Mine won't last that long, but it does make quite a racket when you
> disconnect the mains, maybe loud en
On Mon, Jun 2, 2014 at 6:56 AM, Neil Bothwick wrote:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>
>> The second option does sound what I am looking for. Basically, if I log
>> out but leave my computer on, leave home, some crook/NSA type breaks in
>> and tries to access something or steals
On Monday, June 02, 2014 12:10:38 PM Neil Bothwick wrote:
> On Mon, 02 Jun 2014 06:04:44 -0500, Dale wrote:
> > That said, my UPS claims it will run for about a hour or so. They could
> > go quite a ways around here in a hour.
>
> Mine won't last that long, but it does make quite a racket when yo
On Monday, June 02, 2014 11:56:24 AM Neil Bothwick wrote:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> > The second option does sound what I am looking for. Basically, if I log
> > out but leave my computer on, leave home, some crook/NSA type breaks in
> > and tries to access something or s
On Mon, 02 Jun 2014 06:04:44 -0500, Dale wrote:
> That said, my UPS claims it will run for about a hour or so. They could
> go quite a ways around here in a hour.
Mine won't last that long, but it does make quite a racket when you
disconnect the mains, maybe loud enough to have a thief leave it
Neil Bothwick wrote:
> On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
>
>> The second option does sound what I am looking for. Basically, if I log
>> out but leave my computer on, leave home, some crook/NSA type breaks in
>> and tries to access something or steals my whole puter, they would just
Am 02.06.2014 12:22, schrieb Tanstaafl:
> On 6/1/2014 1:45 PM, Volker Armin Hemmann
> wrote:
>> Am 01.06.2014 14:31, schrieb Tanstaafl:
>>> Wow, I've been mostly offline for a few days, and this morning when
>>> playing catch up on the news, learned that Truecrypt, one of my all
>>> time favorite
On Mon, 02 Jun 2014 05:27:44 -0500, Dale wrote:
> The second option does sound what I am looking for. Basically, if I log
> out but leave my computer on, leave home, some crook/NSA type breaks in
> and tries to access something or steals my whole puter, they would just
> get garbage for data. Th
On Mon, 02 Jun 2014 12:06:18 +0200, Alan McKinnon wrote:
> If you encrypt your home directory then you unlock it when you log in so
> logging out of your DE safely locks things again.
>
> You most likely want the second option, the odds that you have a valid
> need to protect /usr and /opt are no
On Mon, Jun 2, 2014 at 6:06 AM, Alan McKinnon wrote:
> You log in (or boot up), the system asks for a password/key or whatever,
> then unlocks the encryption used.
The more common approach is to not prompt for a password/key, but
instead store it in the TPM using a trusted boot path. This is
pos
Alan McKinnon wrote:
> On 02/06/2014 11:48, Dale wrote:
>
>> I admit, I have never used encryption like this before. I am assuming
>> that if I logout of my GUI, then it is encrypted at that point? Once I
>> log back in, it decrypts it again? Am I at least close?
> All disk encryption works to
Am 02.06.2014 11:20, schrieb Neil Bothwick:
> On Mon, 02 Jun 2014 10:53:51 +0200, Michael Hampicke wrote:
>
>>> I'm considering encrypting my home partition one of these days. Given
>>> the things that have come out in recent months, back doors and such,
>>> what is a good program/software/tool t
On 6/1/2014 1:45 PM, Volker Armin Hemmann
wrote:
Am 01.06.2014 14:31, schrieb Tanstaafl:
Wow, I've been mostly offline for a few days, and this morning when
playing catch up on the news, learned that Truecrypt, one of my all
time favorite apps, is no more.
Some links of interest:
https://www.
On 02/06/2014 11:48, Dale wrote:
> Neil Bothwick wrote:
>> On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:
>>
I'm considering encrypting my home partition one of these days.
>>> why? if you are hacked, they just read what you are reading. Encryption
>>> does not help you th
Neil Bothwick wrote:
> On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:
>
>>> I'm considering encrypting my home partition one of these days.
>> why? if you are hacked, they just read what you are reading. Encryption
>> does not help you there at all.
> It helps if your computer
On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:
> > I'm considering encrypting my home partition one of these days.
>
> why? if you are hacked, they just read what you are reading. Encryption
> does not help you there at all.
It helps if your computer is stolen. This is more,
Am 02.06.2014 10:22, schrieb Dale:
> Volker Armin Hemmann wrote:
>> Am 01.06.2014 14:31, schrieb Tanstaafl:
>>> Wow, I've been mostly offline for a few days, and this morning when
>>> playing catch up on the news, learned that Truecrypt, one of my all
>>> time favorite apps, is no more.
>>>
>>> Som
On Mon, 02 Jun 2014 10:53:51 +0200, Michael Hampicke wrote:
> > I'm considering encrypting my home partition one of these days. Given
> > the things that have come out in recent months, back doors and such,
> > what is a good program/software/tool to use that is well . . .
> > secure? Is there su
Am 02.06.2014 10:22, schrieb Dale:
> Volker Armin Hemmann wrote:
>> Am 01.06.2014 14:31, schrieb Tanstaafl:
>>> Wow, I've been mostly offline for a few days, and this morning when
>>> playing catch up on the news, learned that Truecrypt, one of my all
>>> time favorite apps, is no more.
>>>
>>> Som
Volker Armin Hemmann wrote:
> Am 01.06.2014 14:31, schrieb Tanstaafl:
>> Wow, I've been mostly offline for a few days, and this morning when
>> playing catch up on the news, learned that Truecrypt, one of my all
>> time favorite apps, is no more.
>>
>> Some links of interest:
>>
>> https://www.schn
Alan Mackenzie wrote:
> So, thanks for the email, it brought me back to sanity.
I wish a email could work like that on a lot of people, including me
some days. ;-)
Glad you got it working. James has some good advice on hplip too. I
use it to set up my printer. It works a lot better.
Dale
41 matches
Mail list logo