I did get TAILS running from USB on an Aspire One. I've since installed Linux Mint 15 with full disk encryption on it. Works good so far. :)
On Tue, Dec 31, 2013 at 1:00 PM, <clug-talk-requ...@clug.ca> wrote: > Send clug-talk mailing list submissions to > clug-talk@clug.ca > > To subscribe or unsubscribe via the World Wide Web, visit > http://clug.ca/mailman/listinfo/clug-talk_clug.ca > or, via email, send a message with subject or body 'help' to > clug-talk-requ...@clug.ca > > You can reach the person managing the list at > clug-talk-ow...@clug.ca > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of clug-talk digest..." > > > Today's Topics: > > 1. Jan 8 Meeting (Mel Walters) > 2. Happy New Year! (Mel Walters) > 3. Re: clug-talk Digest, Vol 109, Issue 21 (Geekus Villagius) > 4. Re: clug-talk Digest, Vol 109, Issue 21 (TekBudda) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Mon, 30 Dec 2013 22:19:37 -0700 > From: Mel Walters <melwalt...@telus.net> > To: CLUG General <clug-talk@clug.ca> > Cc: clug events <clug-eve...@clug.ca> > Subject: [clug-talk] Jan 8 Meeting > Message-ID: <1388467177.11604.19.camel@hawk> > Content-Type: text/plain > > Are people generally interested in meeting this day? > > > > > ------------------------------ > > Message: 2 > Date: Mon, 30 Dec 2013 22:25:52 -0700 > From: Mel Walters <melwalt...@telus.net> > To: CLUG General <clug-talk@clug.ca> > Subject: [clug-talk] Happy New Year! > Message-ID: <1388467552.11604.24.camel@hawk> > Content-Type: text/plain > > Happy New Year Everyone > > Mel > > Live long, and prosper > > :) > > > > > ------------------------------ > > Message: 3 > Date: Mon, 30 Dec 2013 22:58:48 -0700 > From: Geekus Villagius <thevillageg...@gmail.com> > To: clug-talk@clug.ca > Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 21 > Message-ID: > <CADZ-tm=essn4smjkl0nmcqufrhgbtcwtcexw53+u35ckahk...@mail.gmail.com> > Content-Type: text/plain; charset=ISO-8859-1 > > Agreed, BIOS passwords are not adequate for more than the casual pest, > but that's why I use encryption too. > > After seeing a friend's computer and other items stolen by some of his > 'friends', I put a 90 decibel alarm inside the tower I used to have, > set to go off when pulled too far from the wall. It would have been a > bit tricky walking out with a mid tower going BEEP! BEEP! BEEP! for 15 > minutes, or sticking around to find a screwdriver, open the tower and > stick the cord back in to silence it. > > On Mon, Dec 30, 2013 at 1:00 PM, <clug-talk-requ...@clug.ca> wrote: >> Send clug-talk mailing list submissions to >> clug-talk@clug.ca >> >> To subscribe or unsubscribe via the World Wide Web, visit >> http://clug.ca/mailman/listinfo/clug-talk_clug.ca >> or, via email, send a message with subject or body 'help' to >> clug-talk-requ...@clug.ca >> >> You can reach the person managing the list at >> clug-talk-ow...@clug.ca >> >> When replying, please edit your Subject line so it is more specific >> than "Re: Contents of clug-talk digest..." >> >> >> Today's Topics: >> >> 1. Re: clug-talk Digest, Vol 109, Issue 20 (Geekus Villagius) >> 2. Re: clug-talk Digest, Vol 109, Issue 20 (Gustin Johnson) >> >> >> ---------------------------------------------------------------------- >> >> Message: 1 >> Date: Sun, 29 Dec 2013 17:37:18 -0700 >> From: Geekus Villagius <thevillageg...@gmail.com> >> To: clug-talk@clug.ca >> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 20 >> Message-ID: >> <cadz-tmnuvzsq1ezvuhxduw0kqyitsia_kvzndh2q67rqbvu...@mail.gmail.com> >> Content-Type: text/plain; charset=ISO-8859-1 >> >> Thanks for the suggestions! >> >> Re TAILS, I've tried it with legacy boot enabled. No luck from the >> USB. There seems to be issues with certain models. It does work from >> DVD though. I did try with TAILS installer, but the result was the >> same. Perhaps a manual install will do the job? >> >> Re the Windows password, I download Ophcrack (the second try gave me a >> valid image) and was able to boot from that, then found that I had to >> download huge files with which to attack the passwords. Since I don't >> have two or three months to wait for the torrent, I looked around >> until I found a video that showed me how to trick Windows into >> presenting a console on the login screen, from which I could reset the >> password. After that, I could not log on with the user profile, but >> could in safe mode. I'll work on the profile issue tonight, when I get >> home. >> >> The trick I employed requires pretty much any Linux live distribution, >> or, in my case, a Linux distro on another partition. I found certain >> files in the Windows/System32/config folder, did a backup of them, >> renamed them to get a console from an icon on the login screen and >> then entered a command to reset the user's password to whatever I >> wanted. A good reminder of why BIOS passwords exist. >> >> http://www.youtube.com/watch?v=t0U2SmUo8zA >> >> >> >> ------------------------------ >> >> Message: 2 >> Date: Mon, 30 Dec 2013 07:14:49 -0700 >> From: Gustin Johnson <gus...@meganerd.ca> >> To: CLUG General <clug-talk@clug.ca> >> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 20 >> Message-ID: >> <CAPM=hj6uisgea9zhw3e14pcs53_gpjvtrn3damzkwrfy00+...@mail.gmail.com> >> Content-Type: text/plain; charset="utf-8" >> >> BIOS passwords are useless. They do not protect against two trivial >> attacks: >> 1) Take the hard drive out of the computer, attach it to another. >> 2) Take the CR2032 battery out of the motherboard. Pull the power. Wait >> 30 seconds. Put the battery back in and reconnect the power. There is now >> no more BIOS password. >> >> Really, the only option is full disk encryption. The downside is that >> slight disk errors can mean that you lose all of the data on your drives. >> You also cannot do any real offline data recovery (which is kind of the >> point of full disk encryption). It really depends on what you are >> protecting against. >> >> Ophtcrack is also not what I would use. If you really want to recover >> passwords, hashcat (and all the related variants) is probably what you >> want. There is a steep but short learning curve with hashcat which means >> that nearly everyone can quickly learn how to use it. This is pretty much >> the state of the art right now and does not rely on "rainbow" tables. >> >> For changing passwords, chntpw will do this on Windows versions <=7. You >> just need access to the SAM database (found in the \windows\system32\config >> directory). chntpw --help should give you enough info assuming you have >> your ntfs windows partition mounted (ntfs-3g is what you want to do this >> with, most modern distributions have this installed and use it by default). >> >> I usually change the local administrator password, then log in with that >> account to change user credentials. >> >> >> On Sun, Dec 29, 2013 at 5:37 PM, Geekus Villagius >> <thevillageg...@gmail.com>wrote: >> >>> Thanks for the suggestions! >>> >>> Re TAILS, I've tried it with legacy boot enabled. No luck from the >>> USB. There seems to be issues with certain models. It does work from >>> DVD though. I did try with TAILS installer, but the result was the >>> same. Perhaps a manual install will do the job? >>> >>> Re the Windows password, I download Ophcrack (the second try gave me a >>> valid image) and was able to boot from that, then found that I had to >>> download huge files with which to attack the passwords. Since I don't >>> have two or three months to wait for the torrent, I looked around >>> until I found a video that showed me how to trick Windows into >>> presenting a console on the login screen, from which I could reset the >>> password. After that, I could not log on with the user profile, but >>> could in safe mode. I'll work on the profile issue tonight, when I get >>> home. >>> >>> The trick I employed requires pretty much any Linux live distribution, >>> or, in my case, a Linux distro on another partition. I found certain >>> files in the Windows/System32/config folder, did a backup of them, >>> renamed them to get a console from an icon on the login screen and >>> then entered a command to reset the user's password to whatever I >>> wanted. A good reminder of why BIOS passwords exist. >>> >>> http://www.youtube.com/watch?v=t0U2SmUo8zA >>> >>> _______________________________________________ >>> clug-talk mailing list >>> clug-talk@clug.ca >>> http://clug.ca/mailman/listinfo/clug-talk_clug.ca >>> Mailing List Guidelines (http://clug.ca/ml_guidelines.php) >>> **Please remove these lines when replying >>> >> -------------- next part -------------- >> An HTML attachment was scrubbed... >> URL: >> <http://clug.ca/pipermail/clug-talk_clug.ca/attachments/20131230/8dbf535e/attachment-0001.html> >> >> ------------------------------ >> >> Subject: Digest Footer >> >> _______________________________________________ >> clug-talk mailing list >> clug-talk@clug.ca >> http://clug.ca/mailman/listinfo/clug-talk_clug.ca >> >> >> ------------------------------ >> >> End of clug-talk Digest, Vol 109, Issue 21 >> ****************************************** > > > > ------------------------------ > > Message: 4 > Date: Tue, 31 Dec 2013 11:32:58 -0700 > From: TekBudda <tekbu...@gmail.com> > To: CLUG General <clug-talk@clug.ca> > Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 21 > Message-ID: <52c30dda.7000...@gmail.com> > Content-Type: text/plain; charset=ISO-8859-1 > > I think you hot on something important here. Security isn't just a > one-trick pony solution. It is layered & appropriate for the usage of > the devices. > > Realistically though IMHO the most important thing to be concerned about > is the data. If my house is on fire I am not going to try to disconnect > my super-tower. I am going to grab my "Oh Crap!" drive & run like the wind. > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > clug-talk mailing list > clug-talk@clug.ca > http://clug.ca/mailman/listinfo/clug-talk_clug.ca > > > ------------------------------ > > End of clug-talk Digest, Vol 109, Issue 22 > ****************************************** _______________________________________________ clug-talk mailing list clug-talk@clug.ca http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying