Search:

Type: Posts; User: CharlesA; Keyword(s):

Page 1 of 10 1 2 3 4

Search: Search took 0.20 seconds.

  1. Replies
    11
    Views
    12

    [ubuntu] Re: Encrypting Ubuntu - Protecting Assets

    You would need some sort of out of band management such as IPMI or iDRAC or something else in order to enter the encryption key on boot.

    There are some ways around that by proving the key via SSH,...
  2. Re: Electrical power draws for multiple desktops, amplifier, a/c etc.

    I do the same. Just be sure to test them regularly - they are useless if they have bad batteries. :)
  3. Re: Electrical power draws for multiple desktops, amplifier, a/c etc.

    That looks really fancy!

    I've got a Kill a Watt that I use for measuring power usage per device or per power strip. It's actually fairly cheap, but it can be a bit hard to read if it's stuffed...
  4. Replies
    10
    Views
    11

    Re: GPU and power usage

    They don't build the dedicated cards to sip power, especially with the amount of memory and cores each of them has.

    For example, the GT 730 you have is rated at 38 Watts and has 1GB of memory with...
  5. Re: Electrical power draws for multiple desktops, amplifier, a/c etc.

    Moved this to the cafe as it isn't really a Ubuntu question.

    As for your question, it depends on the wiring of your house. If you overload the circuit the circuit breakers will trip.

    Are you...
  6. [ubuntu] Re: Is kernel vulnerabilities applicable for nonexistent hardware device ?

    If that device is not present, normally the kernel modules are not loaded, so it is unlikely you would be affected.

    However, as EuclideanCoffee said, ensure your system is patched. You don't...
  7. [all variants] Re: Full encryption for Ubuntu: Why isn't this taken seriously?

    I don't think it is, but I've been using a USB flash drive as /boot because I've got an internal USB header.

    It made my overall partitioning scheme a hell of a lot easier since I was able to...
  8. Replies
    4
    Views
    5

    [SOLVED] Re: SSL certificate with curl

    That's great news. Glad you were able to get it fixed by adding the missing certificate.
  9. Replies
    4
    Views
    5

    [SOLVED] Re: SSL certificate with curl

    Hi,

    Just a heads up, but 14.04 went end of life last year: https://www.omgubuntu.co.uk/2019/04/ubuntu-14-04-end-of-life

    It looks like /usr/local/share/ssl is for root certificates, not the...
  10. [all variants] Re: Full encryption for Ubuntu: Why isn't this taken seriously?

    That would be nice. When I first got encrypted root (but not /boot) set up, I tried getting it to read the keys off the TPM, but it was more of a pain in the butt than I wanted to deal with.

    I...
  11. Replies
    5
    Views
    6

    [SOLVED] Re: Ssh attack from my own server

    Nah, it looks like it's a hosted box since they mentioned VPS and OVH, which is a hosting company.



    Honestly, once a machine is compromised it's usually best to nuke it and reinstall from...
  12. Replies
    6
    Views
    7

    Re: hardened image of ubuntu?

    I definitely agree with you.

    There are even things like CIS Benchmarks for hardening, but they aren't a one-and-done deal. They need to be tailored to your environment.
  13. [ubuntu] Re: Need consulting help on setting up a sftp server on Ubuntu 16.04.

    What? How large of a file are they talking about?

    There are several FTP programs that support resuming interrupted downloads and uploads if an unstable internet connection is the problem.
  14. [server] Re: Server won't restart; file system may be damaged (16.04)

    I've had this stuff happen to me before and it isn't fun to try to recover from it. If you are able to mount a liveCD, you can try the steps listed here to determine if you can mount the lvm and fsck...
  15. [ubuntu] Re: Need consulting help on setting up a sftp server on Ubuntu 16.04.

    In addition to this, you can find some good info about how to disallow weak ciphers here:
    https://cipherli.st/

    Here's some more info about hardening SSH in general:...
  16. Re: Trying to copy hard drives from Windows system with corrupt intelide.sys file

    This might work, but I've never tried it.

    https://superuser.com/questions/939150/how-to-identify-the-windows-version-of-a-dead-install-from-linux-by-having-acces
  17. Re: Trying to copy hard drives from Windows system with corrupt intelide.sys file

    Are you getting I/O errors when trying to copy the files? That's the only reason I can think of that would cause a Linux OS to bomb out.

    Assuming you have an external drive that is large enough to...
  18. [ubuntu_mate] Re: Ubuntu encrypted install, stuck at initramfs

    Hi,

    I ran into something similar to this a long time ago. I don't recall how I got it fixed, but I think it involved having to force the cryptsetup modules to load in initramfs

    Boot into the...
  19. Replies
    6
    Views
    7

    Re: RaspberryPi3B unable to login

    Just in case, I'm missing something, did you open the file and paste the contents of it, or just paste the path?

    Also check out Herman's link. That's a good write up, too.
  20. Replies
    6
    Views
    7

    Re: RaspberryPi3B unable to login

    That doesn't sound right. What error did you get when you tried to upload the public key? There was a link to do so here: https://login.ubuntu.com/ssh-keys
  21. Replies
    6
    Views
    7

    Re: RaspberryPi3B unable to login

    Hi,

    I'm guessing you were following this guide, right? https://ubuntu.com/download/iot/raspberry-pi-2-3-core

    Do you see your SSH key on your Ubuntu One account?
  22. Re: Using A Wired Connection For Security With Wi-Fi Enabled

    I wouldn't call that naive. It is more likely to be used as a targeted attack and not something the majority of people would ever run into.
  23. Re: Using A Wired Connection For Security With Wi-Fi Enabled

    If you have a rogue device on your network, you have more to worry about than its ability to trick you into logging into a fake login page.

    You really should do your own research on this as there...
  24. Re: Using A Wired Connection For Security With Wi-Fi Enabled

    That is correct.



    There are many ways to perform a DNS spoofing attack and that is one of them. You can read about some of them here:...
  25. Re: Using A Wired Connection For Security With Wi-Fi Enabled

    An ISP can see all your traffic unless it's encrypted. That is partially why VPNs are popular - they encrypt your traffic, so your local ISP can't read it, but you also have to trust whatever...
Results 1 to 25 of 250
Page 1 of 10 1 2 3 4