mirror of
				https://github.com/fspc/Yellow-Bike-Database.git
				synced 2025-10-31 08:55:36 -04:00 
			
		
		
		
	Added some new knowledge.
This commit is contained in:
		
							parent
							
								
									5b490e18e7
								
							
						
					
					
						commit
						eff1e61dd4
					
				| @ -221,7 +221,13 @@ DESKTOP STARTUP | ||||
| 
 | ||||
| [Desktop Entry] | ||||
| Type=Application | ||||
| Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key | ||||
| Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key" | ||||
| 
 | ||||
| Where keepass2 is a file in /usr/bin (0755 perms) | ||||
| 
 | ||||
| 		#!/bin/sh | ||||
| 		# e.g. in this case KeePass.exe was intalled in users home, rather than /usr/lib/keepass2 | ||||
| 		exec /usr/bin/cli /home/pos/KeePass/KeePass.exe "$@" | ||||
| 
 | ||||
| 2.  Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,  | ||||
| 	 and add startup application. | ||||
| @ -301,6 +307,8 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions | ||||
|   | ||||
|      set superusers="MyUserName" | ||||
|      password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75 | ||||
|      # if you are using GRUB 2 1.99 the next line needs to be uncommented | ||||
|      # export superusers | ||||
| 
 | ||||
| 4. sudo chmod 0700 40_custom | ||||
| 
 | ||||
| @ -309,13 +317,13 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions | ||||
| SSD or HD ENCRYPTION (optional) | ||||
| 
 | ||||
| If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)  | ||||
| be pretty obvious, and you would want to change YBDB's htpasswd and root password. However, if you  | ||||
| be pretty obvious, and you would want to change YBDB's htpasswd and root password for the computer. However, if you  | ||||
| want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container, | ||||
| for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps, | ||||
| and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern  | ||||
| distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this  | ||||
| include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh  | ||||
| in the advantages and disadvantages for encrypting while factoring into the equation the nature of environment  | ||||
| in the advantages and disadvantages for encrypting while factoring into the equation the nature of the environment  | ||||
| the computer will be located within. | ||||
| 
 | ||||
| SUMMARY | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user