mirror of
https://github.com/fspc/Yellow-Bike-Database.git
synced 2025-04-04 09:33:24 -04:00
Added some new knowledge.
This commit is contained in:
parent
5b490e18e7
commit
eff1e61dd4
@ -221,7 +221,13 @@ DESKTOP STARTUP
|
|||||||
|
|
||||||
[Desktop Entry]
|
[Desktop Entry]
|
||||||
Type=Application
|
Type=Application
|
||||||
Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key
|
Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key"
|
||||||
|
|
||||||
|
Where keepass2 is a file in /usr/bin (0755 perms)
|
||||||
|
|
||||||
|
#!/bin/sh
|
||||||
|
# e.g. in this case KeePass.exe was intalled in users home, rather than /usr/lib/keepass2
|
||||||
|
exec /usr/bin/cli /home/pos/KeePass/KeePass.exe "$@"
|
||||||
|
|
||||||
2. Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,
|
2. Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,
|
||||||
and add startup application.
|
and add startup application.
|
||||||
@ -301,6 +307,8 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions
|
|||||||
|
|
||||||
set superusers="MyUserName"
|
set superusers="MyUserName"
|
||||||
password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75
|
password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75
|
||||||
|
# if you are using GRUB 2 1.99 the next line needs to be uncommented
|
||||||
|
# export superusers
|
||||||
|
|
||||||
4. sudo chmod 0700 40_custom
|
4. sudo chmod 0700 40_custom
|
||||||
|
|
||||||
@ -309,13 +317,13 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions
|
|||||||
SSD or HD ENCRYPTION (optional)
|
SSD or HD ENCRYPTION (optional)
|
||||||
|
|
||||||
If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)
|
If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)
|
||||||
be pretty obvious, and you would want to change YBDB's htpasswd and root password. However, if you
|
be pretty obvious, and you would want to change YBDB's htpasswd and root password for the computer. However, if you
|
||||||
want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container,
|
want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container,
|
||||||
for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps,
|
for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps,
|
||||||
and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern
|
and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern
|
||||||
distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this
|
distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this
|
||||||
include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh
|
include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh
|
||||||
in the advantages and disadvantages for encrypting while factoring into the equation the nature of environment
|
in the advantages and disadvantages for encrypting while factoring into the equation the nature of the environment
|
||||||
the computer will be located within.
|
the computer will be located within.
|
||||||
|
|
||||||
SUMMARY
|
SUMMARY
|
||||||
|
Loading…
x
Reference in New Issue
Block a user