mirror of
https://github.com/fspc/Yellow-Bike-Database.git
synced 2025-02-22 17:03:22 -05:00
Added some new knowledge.
This commit is contained in:
parent
5b490e18e7
commit
eff1e61dd4
@ -221,7 +221,13 @@ DESKTOP STARTUP
|
||||
|
||||
[Desktop Entry]
|
||||
Type=Application
|
||||
Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key
|
||||
Exec=bash -c "secret-tool lookup keepass pos | sudo keepass2 /home/pos/keepass/PositiveSpin.kdbx -pw-stdin -keyfile:/home/pos/keepass/PositiveSpin.key"
|
||||
|
||||
Where keepass2 is a file in /usr/bin (0755 perms)
|
||||
|
||||
#!/bin/sh
|
||||
# e.g. in this case KeePass.exe was intalled in users home, rather than /usr/lib/keepass2
|
||||
exec /usr/bin/cli /home/pos/KeePass/KeePass.exe "$@"
|
||||
|
||||
2. Gnome based Window manager, e.g. Mate - open gnome-session-properties from commandline,
|
||||
and add startup application.
|
||||
@ -301,6 +307,8 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions
|
||||
|
||||
set superusers="MyUserName"
|
||||
password_pbkdf2 MyUserName grub.pbkdf2.sha512.10000.80E702585F80C8D70D4BC75
|
||||
# if you are using GRUB 2 1.99 the next line needs to be uncommented
|
||||
# export superusers
|
||||
|
||||
4. sudo chmod 0700 40_custom
|
||||
|
||||
@ -309,13 +317,13 @@ https://help.ubuntu.com/community/Grub2/Passwords gives good instructions
|
||||
SSD or HD ENCRYPTION (optional)
|
||||
|
||||
If a sign-in computers unencrypted drive goes missing (or is stolen), it should (in most cases)
|
||||
be pretty obvious, and you would want to change YBDB's htpasswd and root password. However, if you
|
||||
be pretty obvious, and you would want to change YBDB's htpasswd and root password for the computer. However, if you
|
||||
want to "help" prevent a detached drive from being accessed, utilitizing an encrypted partition or file container,
|
||||
for the keepass2 system discussed above, would be one way to go, although, even that can be accessed with a few steps,
|
||||
and some forensics (https://dfir.science/2014/08/how-to-brute-forcing-password-cracking.html). While most modern
|
||||
distributions provide an option to encrypt the whole installation, some good reasons for not wanting to do this
|
||||
include a performance hit, and a more complex recovery. When deciding to go the encryption route, you need to weigh
|
||||
in the advantages and disadvantages for encrypting while factoring into the equation the nature of environment
|
||||
in the advantages and disadvantages for encrypting while factoring into the equation the nature of the environment
|
||||
the computer will be located within.
|
||||
|
||||
SUMMARY
|
||||
|
Loading…
x
Reference in New Issue
Block a user