I did get TAILS running from USB on an Aspire One. I've since
installed Linux Mint 15 with full disk encryption on it. Works good so
far. :)

On Tue, Dec 31, 2013 at 1:00 PM,  <clug-talk-requ...@clug.ca> wrote:
> Send clug-talk mailing list submissions to
>         clug-talk@clug.ca
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> or, via email, send a message with subject or body 'help' to
>         clug-talk-requ...@clug.ca
>
> You can reach the person managing the list at
>         clug-talk-ow...@clug.ca
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of clug-talk digest..."
>
>
> Today's Topics:
>
>    1. Jan 8 Meeting (Mel Walters)
>    2. Happy New Year! (Mel Walters)
>    3. Re: clug-talk Digest, Vol 109, Issue 21 (Geekus Villagius)
>    4. Re: clug-talk Digest, Vol 109, Issue 21 (TekBudda)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Mon, 30 Dec 2013 22:19:37 -0700
> From: Mel Walters <melwalt...@telus.net>
> To: CLUG General <clug-talk@clug.ca>
> Cc: clug events <clug-eve...@clug.ca>
> Subject: [clug-talk] Jan 8 Meeting
> Message-ID: <1388467177.11604.19.camel@hawk>
> Content-Type: text/plain
>
> Are people generally interested in meeting this day?
>
>
>
>
> ------------------------------
>
> Message: 2
> Date: Mon, 30 Dec 2013 22:25:52 -0700
> From: Mel Walters <melwalt...@telus.net>
> To: CLUG General <clug-talk@clug.ca>
> Subject: [clug-talk] Happy New Year!
> Message-ID: <1388467552.11604.24.camel@hawk>
> Content-Type: text/plain
>
> Happy New Year Everyone
>
> Mel
>
> Live long, and prosper
>
>      :)
>
>
>
>
> ------------------------------
>
> Message: 3
> Date: Mon, 30 Dec 2013 22:58:48 -0700
> From: Geekus Villagius <thevillageg...@gmail.com>
> To: clug-talk@clug.ca
> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 21
> Message-ID:
>         <CADZ-tm=essn4smjkl0nmcqufrhgbtcwtcexw53+u35ckahk...@mail.gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
>
> Agreed, BIOS passwords are not adequate for more than the casual pest,
> but that's why I use encryption too.
>
> After seeing a friend's computer and other items stolen by some of his
> 'friends', I put a 90 decibel alarm inside the tower I used to have,
> set to go off when pulled too far from the wall. It would have been a
> bit tricky walking out with a mid tower going BEEP! BEEP! BEEP! for 15
> minutes, or sticking around to find a screwdriver, open the tower and
> stick the cord back in to silence it.
>
> On Mon, Dec 30, 2013 at 1:00 PM,  <clug-talk-requ...@clug.ca> wrote:
>> Send clug-talk mailing list submissions to
>>         clug-talk@clug.ca
>>
>> To subscribe or unsubscribe via the World Wide Web, visit
>>         http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>> or, via email, send a message with subject or body 'help' to
>>         clug-talk-requ...@clug.ca
>>
>> You can reach the person managing the list at
>>         clug-talk-ow...@clug.ca
>>
>> When replying, please edit your Subject line so it is more specific
>> than "Re: Contents of clug-talk digest..."
>>
>>
>> Today's Topics:
>>
>>    1. Re: clug-talk Digest, Vol 109, Issue 20 (Geekus Villagius)
>>    2. Re: clug-talk Digest, Vol 109, Issue 20 (Gustin Johnson)
>>
>>
>> ----------------------------------------------------------------------
>>
>> Message: 1
>> Date: Sun, 29 Dec 2013 17:37:18 -0700
>> From: Geekus Villagius <thevillageg...@gmail.com>
>> To: clug-talk@clug.ca
>> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 20
>> Message-ID:
>>         <cadz-tmnuvzsq1ezvuhxduw0kqyitsia_kvzndh2q67rqbvu...@mail.gmail.com>
>> Content-Type: text/plain; charset=ISO-8859-1
>>
>> Thanks for the suggestions!
>>
>> Re TAILS, I've tried it with legacy boot enabled. No luck from the
>> USB. There seems to be issues with certain models. It does work from
>> DVD though. I did try with TAILS installer, but the result was the
>> same. Perhaps a manual install will do the job?
>>
>> Re the Windows password, I download Ophcrack (the second try gave me a
>> valid image) and was able to boot from that, then found that I had to
>> download huge files with which to attack the passwords. Since I don't
>> have two or three months to wait for the torrent, I looked around
>> until I found a video that showed me how to trick Windows into
>> presenting a console on the login screen, from which I could reset the
>> password. After that, I could not log on with the user profile, but
>> could in safe mode. I'll work on the profile issue tonight, when I get
>> home.
>>
>> The trick I employed requires pretty much any Linux live distribution,
>> or, in my case, a Linux distro on another partition. I found certain
>> files in the Windows/System32/config folder, did a backup of them,
>> renamed them to get a console from an icon on the login screen and
>> then entered a command to reset the user's password to whatever I
>> wanted. A good reminder of why BIOS passwords exist.
>>
>> http://www.youtube.com/watch?v=t0U2SmUo8zA
>>
>>
>>
>> ------------------------------
>>
>> Message: 2
>> Date: Mon, 30 Dec 2013 07:14:49 -0700
>> From: Gustin Johnson <gus...@meganerd.ca>
>> To: CLUG General <clug-talk@clug.ca>
>> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 20
>> Message-ID:
>>         <CAPM=hj6uisgea9zhw3e14pcs53_gpjvtrn3damzkwrfy00+...@mail.gmail.com>
>> Content-Type: text/plain; charset="utf-8"
>>
>> BIOS passwords are useless.  They do not protect against two trivial
>> attacks:
>> 1) Take the hard drive out of the computer, attach it to another.
>> 2) Take the CR2032 battery out of the motherboard.  Pull the power.  Wait
>> 30 seconds.  Put the battery back in and reconnect the power.  There is now
>> no more BIOS password.
>>
>> Really, the only option is full disk encryption.  The downside is that
>> slight disk errors can mean that you lose all of the data on your drives.
>>  You also cannot do any real offline data recovery (which is kind of the
>> point of full disk encryption).  It really depends on what you are
>> protecting against.
>>
>> Ophtcrack is also not what I would use.  If you really want to recover
>> passwords, hashcat (and all the related variants) is  probably what you
>> want.  There is a steep but short learning curve with hashcat which means
>> that nearly everyone can quickly learn how to use it.  This is pretty much
>> the state of the art right now and does not rely on "rainbow" tables.
>>
>> For changing passwords, chntpw will do this on Windows versions <=7.  You
>> just need access to the SAM database (found in the \windows\system32\config
>> directory).  chntpw --help should give you enough info assuming you have
>> your ntfs windows partition mounted (ntfs-3g is what you want to do this
>> with, most modern distributions have this installed and use it by default).
>>
>> I usually change the local administrator password, then log in with that
>> account to change user credentials.
>>
>>
>> On Sun, Dec 29, 2013 at 5:37 PM, Geekus Villagius
>> <thevillageg...@gmail.com>wrote:
>>
>>> Thanks for the suggestions!
>>>
>>> Re TAILS, I've tried it with legacy boot enabled. No luck from the
>>> USB. There seems to be issues with certain models. It does work from
>>> DVD though. I did try with TAILS installer, but the result was the
>>> same. Perhaps a manual install will do the job?
>>>
>>> Re the Windows password, I download Ophcrack (the second try gave me a
>>> valid image) and was able to boot from that, then found that I had to
>>> download huge files with which to attack the passwords. Since I don't
>>> have two or three months to wait for the torrent, I looked around
>>> until I found a video that showed me how to trick Windows into
>>> presenting a console on the login screen, from which I could reset the
>>> password. After that, I could not log on with the user profile, but
>>> could in safe mode. I'll work on the profile issue tonight, when I get
>>> home.
>>>
>>> The trick I employed requires pretty much any Linux live distribution,
>>> or, in my case, a Linux distro on another partition. I found certain
>>> files in the Windows/System32/config folder, did a backup of them,
>>> renamed them to get a console from an icon on the login screen and
>>> then entered a command to reset the user's password to whatever I
>>> wanted. A good reminder of why BIOS passwords exist.
>>>
>>> http://www.youtube.com/watch?v=t0U2SmUo8zA
>>>
>>> _______________________________________________
>>> clug-talk mailing list
>>> clug-talk@clug.ca
>>> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>>> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
>>> **Please remove these lines when replying
>>>
>> -------------- next part --------------
>> An HTML attachment was scrubbed...
>> URL: 
>> <http://clug.ca/pipermail/clug-talk_clug.ca/attachments/20131230/8dbf535e/attachment-0001.html>
>>
>> ------------------------------
>>
>> Subject: Digest Footer
>>
>> _______________________________________________
>> clug-talk mailing list
>> clug-talk@clug.ca
>> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>>
>>
>> ------------------------------
>>
>> End of clug-talk Digest, Vol 109, Issue 21
>> ******************************************
>
>
>
> ------------------------------
>
> Message: 4
> Date: Tue, 31 Dec 2013 11:32:58 -0700
> From: TekBudda <tekbu...@gmail.com>
> To: CLUG General <clug-talk@clug.ca>
> Subject: Re: [clug-talk] clug-talk Digest, Vol 109, Issue 21
> Message-ID: <52c30dda.7000...@gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
>
> I think you hot on something important here.  Security isn't just a
> one-trick pony solution.  It is layered & appropriate for the usage of
> the devices.
>
> Realistically though IMHO the most important thing to be concerned about
> is the data.  If my house is on fire I am not going to try to disconnect
> my super-tower.  I am going to grab my "Oh Crap!" drive & run like the wind.
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> clug-talk mailing list
> clug-talk@clug.ca
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>
>
> ------------------------------
>
> End of clug-talk Digest, Vol 109, Issue 22
> ******************************************

_______________________________________________
clug-talk mailing list
clug-talk@clug.ca
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to