I have a 1TB hard disk used as a backup/storage drive. I had all 1TB formatted to NTFS so I could access the files (music and vids, etc) on my Windows partition. While ago I decided to check the...
Type: Posts; User: rookcifer; Keyword(s):
I have a 1TB hard disk used as a backup/storage drive. I had all 1TB formatted to NTFS so I could access the files (music and vids, etc) on my Windows partition. While ago I decided to check the...
No, it's not possible. The attacker would not have Ubuntu's repository signing key and the "update" would fail.
Basically an attacker would have the same access to the machine that the user does. He wouldn't have root unless he has a separate exploit that allows him to escalate (i.e. a flaw in the OS). This...
That could happen upstream. Who's to say that Linus Torvalds hasn't turned evil and started backdooring the kernel code? Who's to say the Apache developers haven't slipped in some malicious payload...
Apparmor logs to syslog.
A LiveCD wont help anyone read the data on the encrypted drive. The only thing they could do would be to destroy your data, but reading it is out of the question unless they have the crypto key.
AV software is useless. Uninstall it now and be happy.
In such a case, it's not a big deal to use MD5. For what Ubuntu uses it for, it doesn't need to be collision resistant because it is only used as a checksum. As for package integrity, the PGP...
You can still use my profiles for Firefox even if not using totem or gnome-mplayer.
The problem is the user-files abstraction allowing writing to anywhere in /home.
The best bet is just to use the profile I made. You can find it here.
All of this I agree with. Tor is an anonymity network and not a data integrity or privacy network. There is a difference in privacy and anonymity.
This I do not agree with. While there...
It depends. Diaspora is designed in such a way that you can setup your own private social network (on your own server that you physically own) and only invite who you want (a private VPN if you...
Brute-forcing only works if the AP uses a weak password. Good luck brute forcing my router, which has a random 128 bit password.
In any case, your point is moot with public open Wifi since it...
rsyslog is your system logger. It is normal. As the guy above said, the message is just giving info about where to find more info about rsyslog (website).
This doesn't happen 100% of the time, but happens probably 50-75%.
The issue is whenever I right-click on an icon on my Unity panel, it causes the entire desktop to freeze. The right-click menu...
Are you trying to download a specific package? If so, which one?
Why do you feel you need ClamAV on your machine?
It *should* but it doesn't always in practice. There are ways around non-executable data regions. If you're really technical (i.e. understand C, assembly, and programming at the most basic level),...
You need to read the logs and add rules manually. You need to add the /proc/[0-9]*/status line to the sandbox profile first. From there you're just going to have to read logs and keep adding rules...
OK, add the lines I provided you to the "chromium-sandbox" profile and see if that works. That's the child profile near the bottom of the profile.
Add these:
/sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq r,
/dev/null rw,
/proc/[0-9]*/status r,
Then run:
You should probably use either Hungry's profiles or mine. You shouldn't mix them.
The main difference in our profiles is Hungry defines each shared library separately. I tried doing this at...
Try:
#include <abstractions/base>
Put that at the top of the profile.
Also add:
Run:
sudo aa-logprof
Then look at the entries related to Chromium and allow them, Restart and see if it works.