Search:

Type: Posts; User: EuclideanCoffee; Keyword(s):

Page 1 of 8 1 2 3 4

Search: Search took 0.01 seconds.

  1. Re: How to use Firejail with Tor browser ?

    Here are instructions on how to run any application from firejail.

    https://www.linux.com/topic/desktop/lock-your-untrusted-applications-firejail/



    Oh to run binaries outside of /usr/bin/...
  2. Re: slow login ended in broken system

    The sad smile is a Windows prompt and unrelated to the login problem.

    Your problem isn't the slow logins. Logins check one or two files in your system. Since the check is taking longer, your...
  3. [SOLVED] Re: Wireshark Shows Odd Connections with Skype....When I Don't Have It Installed

    You already stated the problem. You've been downloading torrents and cannot identify which application may be the trojan. In security terms, you've been conducting high risk activity, which will...
  4. [SOLVED] Re: debian buster xfce firefox esr how to enable apparmor profiles

    Please write your solution, so this can be a helpful resource for others. Thank you.
  5. Replies
    5
    Views
    6

    [SOLVED] Re: Ssh attack from my own server

    This is on your home NAT? That's troubling. Close up your router while working on this. Thanks.
  6. Replies
    5
    Views
    6

    [SOLVED] Re: Ssh attack from my own server

    You must act quickly. Turn off your server.

    When you've done so, I can provide next steps. I recommend hiring someone to assist you today. I don't provide services from this account, so I won't...
  7. Replies
    2
    Views
    3

    Re: What is Core Boot

    Essentially this works below your operating system. Without programming or flashing the drive, you won't need to learn anything new.

    coreboot, formerly known as LinuxBIOS,[4] is a software project...
  8. Replies
    1
    Views
    2

    Re: Use old PC as a firewall?

    Your assumption that this wouldn't work because the server is behind the router is correct.

    Recommended reading: https://openwrt.org/

    Sorry that some *bleep* is hazing you. :)

    I'll leave...
  9. Replies
    9
    Views
    10

    Re: 5 Billionth search scam

    Yes, exactly as it is written. Please post a new thread if you have a specific question about app-armor in Debian, as this thread has been resolved more or less.
  10. Re: I don't know what DoH (DNS over HTTPS) is and if I should enable it?

    DoH does not hide your IP address.

    Before you visit a website, your computer queries a server called a DNS server. This server returns the true IP address for a URL such as ubuntuforums.com.
    ...
  11. Re: I don't know what DoH (DNS over HTTPS) is and if I should enable it?

    Go to this website and run a standard test.
    https://www.dnsleaktest.com/

    You should see Cloudflare or whatever you chose for DoH.
  12. Replies
    11
    Views
    12

    Re: League of Legends

    Appears the performance is bad on wine for Linux.

    https://appdb.winehq.org/objectManager.php?sClass=application&iId=10436

    However, I heard good things about Lutris.
    ...
  13. Replies
    14,549
    Views
    989,621

    Re: What are you listening to right now?

    Werewolf Gimmick - the Mountain Goats
  14. Re: Success with desktop LXD containers! Woot!

    Fascinating. This would be an excellent thing to add to my tech stack. Thanks for the information!
  15. Re: Success with desktop LXD containers! Woot!

    Congratulations. Could you please go into what your stack looks like? Are you using docker?
  16. Re: Mitigation Tomcat CVE-2020-1938

    It is the UFW rule, friend. lol. Glad it worked.
  17. [ubuntu] Re: OpenSSH version on Ubuntu 18.04.4 LTS

    I don't recommend an upgrade.

    I understand the feeling to want to simply check a box, but I want to implore you to not install 7.8 but keep the native 7.6 package with security updates. And here...
  18. Re: Recover LUKS encrypted data from external HDD

    You should be able to mount the drive on your root partition. I thought in your original post you mentioned you had done this already.

    As an example the desktop comes with a file explorer called...
  19. Replies
    9
    Views
    10

    [ubuntu] Re: LUKS Trouble

    Yikes. This is a bit old.

    I'm glad the passphrase works.

    Have you done these steps to create a keyfile?



    [root ~]# dd if=/dev/random bs=32 count=1 of=/root/random_data_keyfile1
    [root ~]#...
  20. Replies
    9
    Views
    10

    [ubuntu] Re: LUKS Trouble

    Thank you. That's helpful to know.

    If instead of a keyfile, you use a passphrase, do you have the same problem?

    If the pass phrase works, then we know it's a problem with your key file.

    When...
  21. Replies
    9
    Views
    10

    [ubuntu] Re: LUKS Trouble

    You haven't tried adding a key with the commands above? That way describes how I built out a system that self-manages thousands of machines. There is no need to specify which slot you use. There are...
  22. Replies
    9
    Views
    10

    [ubuntu] Re: LUKS Trouble

    Do you you have your keyfile set?

    /etc/luks-keys/disk_secret_key

    This path should be where a file exists. Do



    cat /etc/luks-keys/disk_secret_key
  23. Re: Recover LUKS encrypted data from external HDD

    You created a new installation with the external drive mounted as a partition?

    Of course your home user won't have permission to open /proc because the permission belongs to root.

    If you take...
  24. Replies
    9
    Views
    10

    Re: 5 Billionth search scam

    Since most threats are carried via port 80 or 443, which is web traffic, you can still receive what is called a "payload" even when firewalls are up. I'm not saying that firewalls don't help, but if...
  25. Re: Mitigation Tomcat CVE-2020-1938

    Yes, I understand. UFW will block the entire port, and you will not be able to communicate with localhost. You will need to adjust the rule with IPTables.

    Delete the rule from UFW and follow the...
Results 1 to 25 of 191
Page 1 of 8 1 2 3 4