mirror of
				https://github.com/fspc/Yellow-Bike-Database.git
				synced 2025-10-31 17:05:36 -04:00 
			
		
		
		
	Added some new knowledge.
This commit is contained in:
		
							parent
							
								
									5b490e18e7
								
							
						
					
					
						commit
						eff1e61dd4
					
				| @ -221,7 +221,13 @@ DESKTOP STARTUP | |||||||
| 
 | 
 | ||||||
| [Desktop Entry] | [Desktop Entry] | ||||||
| Type=Application | Type=Application | ||||||
| Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key | Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key" | ||||||
|  | 
 | ||||||
|  | Where keepass2 is a file in /usr/bin (0755 perms) | ||||||
|  | 
 | ||||||
|  | 		#!/bin/sh | ||||||
|  | 		# e.g. in this case KeePass.exe was intalled in users home, rather than /usr/lib/keepass2 | ||||||
|  | 		exec /usr/bin/cli /home/pos/KeePass/KeePass.exe "$@" | ||||||
| 
 | 
 | ||||||
| 2.  Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,  | 2.  Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,  | ||||||
| 	 and add startup application. | 	 and add startup application. | ||||||
| @ -301,6 +307,8 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions | |||||||
|   |   | ||||||
|      set superusers="MyUserName" |      set superusers="MyUserName" | ||||||
|      password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75 |      password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75 | ||||||
|  |      # if you are using GRUB 2 1.99 the next line needs to be uncommented | ||||||
|  |      # export superusers | ||||||
| 
 | 
 | ||||||
| 4. sudo chmod 0700 40_custom | 4. sudo chmod 0700 40_custom | ||||||
| 
 | 
 | ||||||
| @ -309,13 +317,13 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions | |||||||
| SSD or HD ENCRYPTION (optional) | SSD or HD ENCRYPTION (optional) | ||||||
| 
 | 
 | ||||||
| If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)  | If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)  | ||||||
| be pretty obvious, and you would want to change YBDB's htpasswd and root password. However, if you  | be pretty obvious, and you would want to change YBDB's htpasswd and root password for the computer. However, if you  | ||||||
| want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container, | want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container, | ||||||
| for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps, | for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps, | ||||||
| and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern  | and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern  | ||||||
| distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this  | distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this  | ||||||
| include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh  | include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh  | ||||||
| in the advantages and disadvantages for encrypting while factoring into the equation the nature of environment  | in the advantages and disadvantages for encrypting while factoring into the equation the nature of the environment  | ||||||
| the computer will be located within. | the computer will be located within. | ||||||
| 
 | 
 | ||||||
| SUMMARY | SUMMARY | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user