Re: Network Security and COX (was Need Advice on Routers)

2009-05-01 Thread Technomage
Sir Light wrote: > Mark, > > When I went online with COX, one thing above all else is that I knew I MUST, > let me scream that LOUDLY again, ***MUST*** have a firewall in place. > > Why? Simple... > > To stop people from coming into my network with things I do NOT want like > viruses, people try

Re: HackFest Series: TrueCrypt is Now Detectable

2009-05-01 Thread Technomage
Lisa Kachold wrote: > TrueCrypt is now Detectable > > "Sorry Charley!" not quite so fast. I have checked the tool as detailed on the site above and even tried a few tests. the results were inconclusive at best. the tool (as described) could not re

Re: How to remove a bond interface via command line

2009-05-01 Thread Lisa Kachold
WARNING! * I would be in the NOC, standing in front of the machine when you do this!* [Or at least have another interface with ssh available...] The best way to do this is to copy the bonded interface ifcfg files to backup and edit: /etc/sysconfig/network/ifcfg.template Once you are satisfied th

Re: How to remove a bond interface via command line

2009-05-01 Thread Stephen
thanks. ill have to keep this handy as well. but i wa sable to get it last night. On Fri, May 1, 2009 at 6:47 AM, Lisa Kachold wrote: > WARNING! > > I would be in the NOC, standing in front of the machine when you do this! > [Or at least have another interface with ssh available...] > > The best

Re: HackFest Series: TrueCrypt is Now Detectable

2009-05-01 Thread Ryan Rix
detection != decryption. I'm filing this one in the FUD/misinformation department. On Thu, Apr 30, 2009 at 5:49 PM, Lisa Kachold wrote: > Ah, you guys? > > This is about the ability to determine if: > > 1) a header has been encrypted > 2) a drive has an encrypted partition > > etc... > > It's a

Re: HackFest Series: TrueCrypt is Now Detectable

2009-05-01 Thread Jim March
On Fri, May 1, 2009 at 8:44 AM, Ryan Rix wrote: > detection != decryption Except they can then beat the password out of you, aka "rubber hose decryption". Jim --- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsub

Re: interesting article re. new regulations for internet security professionals

2009-05-01 Thread keith smith
You raise a lot of good questions.  Questions everyone should be asking.  If we do not stop the erosion of our rights we will loose them and getting them back will come at a great price. Freedom is not free.  If everyone spent just 2 hours a week getting involved then we can stay free and mayb

OT : Re: interesting article re. new regulations for internet security professionals

2009-05-01 Thread Alex Dean
This is off-topic so I've labelled it as such. I'd prefer just to see it die altogether, but if you must continue please use the OT subject line as a courtesy. alex On May 1, 2009, at 9:13 AM, keith smith wrote: You raise a lot of good questions. Questions everyone should be asking.

Strange process on my Debian Laptop

2009-05-01 Thread Mark Phillips
The following process kicks off on my Debian laptop - narwhale:/home/mark# ps aux | grep rsync root 10878 1.0 5.0 54652 52148 ? Ss 06:59 1:40 /usr/bin/rsync --server --sender --numeric-ids --perms --owner --group --links --times --block-size=2048 --recursive -D --exclude=/proc --exclude=/dev --exc

Re: Strange process on my Debian Laptop

2009-05-01 Thread Lisa Kachold
Mark, That is a pid 10878; you can use the command: # lsof to see all of the files and threads open on your system; piping to grep for pid # or process name. This is a root owned rsync --server process, as you said associated with backuppc. Not a lot more to talk about? But if you would like t

Re: OT: deceased erstwhile microwave oven

2009-05-01 Thread Mike Schwartz
OK, thank you! Happy Ending btw, I did not end up needing to call http://www.rmsrecycle.com/rmsrecycle.html after all - because when I called Westech today, I eventually got the info I needed, from them. (side note: they did put me on hold for a long time, but -- fortunately -- I was sitting

OT: "enhanced interrogation" (was: Re: HackFest Series: TrueCrypt is Now Detectable)

2009-05-01 Thread Mike Schwartz
Oh, so *** that's *** what the phrase "rubber hose decryption" means; in some previous post (probably recently - in the parent thread?) that phrase was used but I thought maybe it was some FOSS tool that I was not familiar with. ...sorta timely, since there is all kinds of ruckus going on in the m

Re: OT: "enhanced interrogation" (was: Re: HackFest Series: TrueCrypt is Now Detectable)

2009-05-01 Thread Joe
Yeah, that's why TrueCrypt's ability to "hide" the volume on a device is so awesome. The idea is, people don't realize anything is even there to BE encrypted. One thing I was reading about with regard to plausible deniability is to hide your volumes inside of other files. For example, I have a jum

Re: OT: "enhanced interrogation" (was: Re: HackFest Series: TrueCrypt is Now Detectable)

2009-05-01 Thread Jim March
On Fri, May 1, 2009 at 1:52 PM, Mike Schwartz wrote: > Oh, so *** that's *** what the phrase "rubber hose decryption" means; > in some previous post (probably recently - in the parent thread?) that > phrase was used but I thought maybe it was some FOSS tool that I was not > familiar with. Heh. Y

Re: OT: "enhanced interrogation" (was: Re: HackFest Series: TrueCrypt is Now Detectable)

2009-05-01 Thread Judd Pickell
Wouldn't one problem with your plan be is that the file size would be different? Of course that would only matter if the person looking knew the typical size, or the software checking the drive wasn't doing file size checks on known files. Gotta wonder what Anti-virus software would make of the fil

Re: Why Wubi is the stupidest idea in Linux history...

2009-05-01 Thread Ryan Rix
Or, you know, a dual bootable setup is deathly easy with the ubuntu installer and as was pointed out, much safer... On Thu, Apr 30, 2009 at 10:14 PM, Matthew A Coulliette wrote: > Hi, > > I think wubi is a great idea. It reminds me of the OpenCD project that > had all multi-platform software on

Re: OT: "enhanced interrogation" (was: Re: HackFest Series: TrueCrypt is Now Detectable)

2009-05-01 Thread Joe
I made the file, I didn't overwrite an existing one. Yes, it's possible to find the file, but it's hard to figure out what it is (since TrueCrypt leaves no headers although the topic the thread WAS detection). The idea, more than anything, is that I can say I have no idea what the extra file i

Re: OT: "enhanced interrogation" (was: Re: HackFest Series: TrueCrypt is Now Detectable)

2009-05-01 Thread Robert Holtzman
On Fri, 1 May 2009, Joe wrote: > I made the file, I didn't overwrite an existing one. Yes, it's possible > to find the file, but it's hard to figure out what it is (since > TrueCrypt leaves no headers although the topic the thread WAS > detection). > > The idea, more than anything, is that I c

Re: Why Wubi is the stupidest idea in Linux history...NOT!

2009-05-01 Thread Mark Jarvis
Someone who has never known anything but Windoze and who wants to try (or has been talked into trying) Linux wants to do so with an absolute guarantee that their precious Windoze installation won't be hurt or permanently affected. If Ubuntu is the trial distro, that means either a live CD or W

Re: Why Wubi is the stupidest idea in Linux history...

2009-05-01 Thread Stephen
Tys but it may be better if does not "ininstall" and this will chase off people With wini they can just delete ubuntu if they don't like it, which is its real purpose On 5/1/09, Ryan Rix wrote: > Or, you know, a dual bootable setup is deathly easy with the ubuntu > installer and as was pointed

Re: Why Wubi is the stupidest idea in Linux history...NOT!

2009-05-01 Thread Ryan Rix
The problem is that most users will not see the upgrade path when they are ready for it, leaving them at the will of the windwos boot loader utnil it goes kaput and their ubuntu install is at the will of a fussy ntfs filesystem. Imo wubi gives a new user a small paddle boat to get out to the main