On 2020-06-27 01:46, Andrei POPESCU wrote:
The latest recommendation I saw for "cheap flash based" storage is 4MiB
in order to align with erase block sizes, so now I'm starting all my
partitions at 4MiB instead of 1MiB.
Interesting subject -- thanks for bringing it up. :-)
STFW there does
On 2020-06-27 12:47, David Christensen wrote:
The ATA secure erase command is
designed to erase all blocks, both host-accessible and hidden.
STFW, "secure erase" (aka "security erase") is an older feature and may
not erase all NAND blocks, just the "mapping table". (When I have done
this on
On 6/27/20 6:00 AM, David Christensen wrote:
On 2020-06-26 18:25, David Wright wrote:
There's still the problem of what one does about sensitive data if
one has been rash enough to write it unencrypted onto an SSD. Would
shred -n 1 be preferable? Not really, because that doesn't hit the
ex-fi
On Vi, 26 iun 20, 20:25:32, David Wright wrote:
>
> Ironically, 2048 is neither cargo cult nor magic, but *is* the default
> used by LUKS when the kernel does not supply one, as documented two
> paragraphs earlier. Are you suggesting a 1MB alignment might be
> insufficient? If one were to specify
1) backup your data to external usb drive
2) reinstall with encrypted enabled
3) restore data
= a lot of unencrypted data get's overwritten (if user does not have a
lot of data, generate some X-D)
On 6/27/20 6:00 AM, David Christensen wrote:
> On 2020-06-26 18:25, David Wright wrote:
>
>> There
On 2020-06-26 21:00, David Christensen wrote:
On 2020-06-26 18:25, David Wright wrote:
There's still the problem of what one does about sensitive data if
one has been rash enough to write it unencrypted onto an SSD. Would
shred -n 1 be preferable? Not really, because that doesn't hit the
ex-f
On 2020-06-26 18:25, David Wright wrote:
There's still the problem of what one does about sensitive data if
one has been rash enough to write it unencrypted onto an SSD. Would
shred -n 1 be preferable? Not really, because that doesn't hit the
ex-file areas. What then?
The best option is to c
On Fri 26 Jun 2020 at 15:45:09 (-0400), Michael Stone wrote:
> On Fri, Jun 26, 2020 at 02:06:57PM -0500, David Wright wrote:
> > Agreed. But I wouldn't be writing any sensitive information to an SSD
> > in the first place without encrypting it. (Not that I own any yet.)
>
> SSDs are more common th
On Fri, Jun 26, 2020 at 02:06:57PM -0500, David Wright wrote:
Agreed. But I wouldn't be writing any sensitive information to an SSD
in the first place without encrypting it. (Not that I own any yet.)
SSDs are more common than not in new computers so it's probably best to
assume that people rea
On Fri 26 Jun 2020 at 11:47:34 (-0400), Michael Stone wrote:
> On Fri, Jun 26, 2020 at 08:25:49AM -0500, David Wright wrote:
> > If encrypting an entire disk, scramble the disk first, then partition.
> > If only encrypting a partition, partition the disk first.
> > Alignments should be at least 2M
On Fri, Jun 26, 2020 at 08:25:49AM -0500, David Wright wrote:
If encrypting an entire disk, scramble the disk first, then partition.
If only encrypting a partition, partition the disk first.
Alignments should be at least 2M (4096 x 512B sectors).
Scramble any sensitive pre-existing contents:
# d
Thanks -- very helpful! I mayb have some more questions as I triy to digest
this, but can't spend time on it today.
Nothing new below this line.
On Friday, June 26, 2020 09:25:49 AM David Wright wrote:
> On Thu 25 Jun 2020 at 07:40:43 (-0400), rhkra...@gmail.com wrote:
> > On Wednesday, June 24
On Thu 25 Jun 2020 at 07:40:43 (-0400), rhkra...@gmail.com wrote:
> On Wednesday, June 24, 2020 10:20:55 PM David Wright wrote:
> > On Wed 24 Jun 2020 at 21:28:38 (-0400), rhkra...@gmail.com wrote:
> > > On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file
> > > system on a dedic
On Thursday, June 25, 2020 10:14:50 AM rhkra...@gmail.com wrote:
> Can you give me any clues about how you told it which audio device to use
> (and which you told it to use)?
Ahh, I found the settings screen and switched the audio (to "Built In Analog
Audio Stereo") and tested it -- it works.
(I
On Thursday, June 25, 2020 07:29:53 AM rhkra...@gmail.com wrote:
> At least for the Jessie system, I'd like to install some encrypted
> filesystems without reinstalling (or replacing) Jessie.
Does anybody know what the DI (Debian Installer) installs by default for an
encrypted fi
On Thursday, June 25, 2020 09:25:06 AM David wrote:
> Hi, are you aware that Zoom has available a Linux-compatible
> desktop client application that runs without a browser?
Thanks, yes, that is one of the ways I tried to join the zoom meeting on my
Jessie system -- the client says it requires / w
On Thu, Jun 25, 2020 at 03:57:53PM +0200, Nicolas George wrote:
> to...@tuxteam.de (12020-06-25):
> > You don't use Pulseaudio? Current Firefoxen have ALSA enabled for Debian,
> > but their ALSA support seems to have fallen prey to bitrot. I didn't
> > manage to get them working.
> >
> > If you in
to...@tuxteam.de (12020-06-25):
> You don't use Pulseaudio? Current Firefoxen have ALSA enabled for Debian,
> but their ALSA support seems to have fallen prey to bitrot. I didn't
> manage to get them working.
>
> If you insist in not having Pulse (I do), there's apulse (the package
> is named like
On Thu, Jun 25, 2020 at 03:34:02PM +0200, Nicolas George wrote:
> David (12020-06-25):
> > Hi, are you aware that Zoom has available a Linux-compatible
> > desktop client application that runs without a browser?
> >
> > It works on Buster, apart from needing to be told which audio
> > device to us
David (12020-06-25):
> Hi, are you aware that Zoom has available a Linux-compatible
> desktop client application that runs without a browser?
>
> It works on Buster, apart from needing to be told which audio
> device to use every time it is run.
> Available here:
> https://zoom.us/download#client_
On Thu, 25 Jun 2020 at 21:30, wrote:
> I might consider reinstalling the Buster system,
> I might even replace it with testing as, for some purposes, I need a Firefox
> more up-to-date than that in Buster.
>
> (I tried to join a Zoom meeting and could not get sound, I got a message that
> my Fire
On Wednesday, June 24, 2020 10:20:55 PM David Wright wrote:
> On Wed 24 Jun 2020 at 21:28:38 (-0400), rhkra...@gmail.com wrote:
> > On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file
> > system on a dedicated partition
>
> What were the contents of this partition: the OS itsel
On Wednesday, June 24, 2020 09:34:00 PM Roberto C. Sánchez wrote:
> On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote:
> > I'm wondering if cryptsetup is still something like "state of the art" or
> > if there is anything more secure and simpler to learn to setup?
>
> Assuming you
On 6/25/2020 3:34 AM, Roberto C. Sánchez wrote:
On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote:
On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file system
on a dedicated partition (actually, two filesystems).
It was a PITA learning how to do it, and it wa
On Wed 24 Jun 2020 at 21:28:38 (-0400), rhkra...@gmail.com wrote:
> On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file
> system
> on a dedicated partition
What were the contents of this partition: the OS itself, or /home,
or an independent filesystem that you'd probably moun
On 2020-06-24 18:34, Roberto C. Sánchez wrote:
On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote:
On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file system
on a dedicated partition (actually, two filesystems).
It was a PITA learning how to do it, and it was
On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote:
> On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file
> system
> on a dedicated partition (actually, two filesystems).
>
> It was a PITA learning how to do it, and it was 6 years ago, and it looks
> like
>
On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file system
on a dedicated partition (actually, two filesystems).
It was a PITA learning how to do it, and it was 6 years ago, and it looks like
I have to relearn it to do it again on Jessie and / or Buster (and on a backup
devi
[Catching up on a d-u backlog:]
On Sun, 16 Aug 2009 12:03:25 +0300
Γιώργος Πάλλας wrote:
> Teemu Likonen wrote:
> > On 2009-08-12 09:38 (+0300), Teemu Likonen wrote:
> >
> >
> >> Do you (or anybody) have numbers or educated guesses on how much it
> >> slows down the disk operation or how it w
Teemu Likonen wrote:
> On 2009-08-12 09:38 (+0300), Teemu Likonen wrote:
>
>
>> Do you (or anybody) have numbers or educated guesses on how much it
>> slows down the disk operation or how it will affect CPU load?
>>
>
> I found such an article and it seems to indicate that LUKS system has n
On 2009-08-12 09:38 (+0300), Teemu Likonen wrote:
> Do you (or anybody) have numbers or educated guesses on how much it
> slows down the disk operation or how it will affect CPU load?
I found such an article and it seems to indicate that LUKS system has no
much performance penalty on disk IO.
ht
On 2009-08-06 19:21 (-0500), Manoj Srivastava wrote:
> I encrypt everything except /boot -- even swap.
I do that on my laptop as well. Do you (or anybody) have numbers or
educated guesses on how much it slows down the disk operation or how
it will affect CPU load?
--
To UNSUBSCRIBE, email to de
On 2009-08-10 18:49, line...@ruiner.halo.nu wrote:
[snip]
The root filesystem is encrypted to make it more difficult for a
local attacker to replace system binaries with backdoored
versions.
I don't think this is a valid reason for encrypting root.
--
Scooty Puff, Sr
The Doom-Bringer
--
To
On Tuesday 11 August 2009 17:41:48 line...@ruiner.halo.nu wrote:
> Ok I guess the system is just hosed. If no one has any more suggestions in
> the next couple days I will reinstall.
>
>
> I will never trust Debian upgrades again, at least not when encrypted
> filesystems are in use.
Well, all
Ok I guess the system is just hosed. If no one has any more suggestions in the
next couple days I will reinstall.
I will never trust Debian upgrades again, at least not when encrypted
filesystems are in use.
On Mon, Aug 10, 2009 at 06:49:51PM -0500, line...@ruiner.halo.nu wrote:
> > hmm
> hmmm not sure, you could try
> turning of quiet mode remove the quiet from the kernel option on boot
> and maybe try turning on debug (add debug to the kernal options)
There is no quiet mode in my kernel line. Adding the debug option didn't seem
to add any additional relevant information;
>
On Wednesday 05 August 2009 19:54:50 line...@ruiner.halo.nu wrote:
> I tried configuring fstab to use the UUID from blkid, but I had the same
> problem. Could the problem be that the SCSI drives are not coming up until
> cryptsetup has loaded?
Hi again lineman (and list).
Just for another da
On Thu, Aug 06, 2009 at 19:21 -0500, Manoj Srivastava wrote:
> On Thu, Aug 06 2009, Siggy Brentrup wrote:
>
> > On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote:
> >> Hi -
> >
> >> I have a Debian Etch system which I recently upgraded to v5.0.2.
> >> The file system was encrypted with LU
On Thu, Aug 06, 2009 at 18:29 -0400, Andrew Reid wrote:
> On Thursday 06 August 2009 04:16:42 Siggy Brentrup wrote:
> > Please bear with me, I'm asking this out of curiousity. Why did you
> > encrypt the full root FS? I can understand that you want your $HOME
> > encrypted, to a lesser degree I c
On Thu, Aug 06 2009, Siggy Brentrup wrote:
> On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote:
>> Hi -
>
>> I have a Debian Etch system which I recently upgraded to v5.0.2.
>> The file system was encrypted with LUKS at install time.
>
> Please bear with me, I'm asking this out of curious
On Thursday 06 August 2009 04:16:42 Siggy Brentrup wrote:
> On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote:
> > Hi -
> >
> > I have a Debian Etch system which I recently upgraded to v5.0.2.
> > The file system was encrypted with LUKS at install time.
>
> Please bear with me, I'm asking
On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote:
> Hi -
> I have a Debian Etch system which I recently upgraded to v5.0.2.
> The file system was encrypted with LUKS at install time.
Please bear with me, I'm asking this out of curiousity. Why did you
encrypt the full root FS? I can un
On Wednesday 05 August 2009 19:54:50 line...@ruiner.halo.nu wrote:
> I tried configuring fstab to use the UUID from blkid, but I had the same
> problem. Could the problem be that the SCSI drives are not coming up until
> cryptsetup has loaded?
This could happen if the new kernel's initramfs doe
On Wed, Aug 05, 2009 at 06:54:50PM -0500, line...@ruiner.halo.nu wrote:
> I tried configuring fstab to use the UUID from blkid, but I had the same
> problem. Could the problem be that the SCSI drives are not coming up until
> cryptsetup has loaded?
hmmm not sure, you could try
turning of quiet
I tried configuring fstab to use the UUID from blkid, but I had the same
problem. Could the problem be that the SCSI drives are not coming up until
cryptsetup has loaded?
Here is some info on my configuration:
t...@magnesium:/etc/initramfs-tools/conf.d$ cat resume
RESUME=/dev/mapper/magnesium
On Tue, Aug 04, 2009 at 06:50:56PM -0500, line...@halo.nu wrote:
> Hi -
>
> I have a Debian Etch system which I recently upgraded to v5.0.2. The file
> system was encrypted with LUKS at install time.
>
> The upgrade appeared to go well, however when I boot into the new system, it
> gives the f
Hi -
I have a Debian Etch system which I recently upgraded to v5.0.2. The file
system was encrypted with LUKS at install time.
The upgrade appeared to go well, however when I boot into the new system, it
gives the following error:
Volume group "hostname" not found
cryptsetup: Source device /d
Hi -
I have a cryptsetup encrypted filesystem on Etch. I set it up at install time.
When I updated to 5.0.2, it no longer boots.
The kernel says "Waiting for root file system", then "cryptsetup: source device
/dev/sda5 not found"
The system still boots when I select th
Hi -
I have a cryptsetup encrypted filesystem on Etch. I set it up at install time.
When I updated to 5.0.2, it no longer boots.
The kernel says "Waiting for root file system", then "cryptsetup: source device
/dev/sda5 not found"
The system still boots when I select th
Richard Hector wrote:
>> I don't understand why ubuntu users keep coming to debian forumes with
>> their ubuntu problems.
>
> I don't see that anyone has done that in this thread; I was merely using
> it as an example.
>
> I know that Debian can set up sudo at install time, though I don't think
On Thu, 2009-01-29 at 23:33 +0100, Emanoil Kotsev wrote:
> Alex Potter wrote:
>
> > On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote:
> >
> >> I think it's the normal Ubuntu way, right?
> >
> > It is.
> >
>
> I don't understand why ubuntu users keep coming to debian forumes with their
Ron Johnson wrote:
> Let's not forget NetworkMangler. I installed dual-boot Ubuntu on my
> kids's computer because of the handy gui partition resizer tool, but
> *hated* the actual Ubuntu installation. Must be too used to the CLI.
>
long lives cli, amen!
--
To UNSUBSCRIBE, email to debian
On 01/29/2009 04:33 PM, Emanoil Kotsev wrote:
Alex Potter wrote:
On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote:
I think it's the normal Ubuntu way, right?
It is.
I don't understand why ubuntu users keep coming to debian forumes with their
ubuntu problems.
besides the explanat
Alex Potter wrote:
> On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote:
>
>> I think it's the normal Ubuntu way, right?
>
> It is.
>
I don't understand why ubuntu users keep coming to debian forumes with their
ubuntu problems.
besides the explanation given by ubuntu for dropping the r
On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote:
> I think it's the normal Ubuntu way, right?
It is.
--
Regards
Alex
http://www.badphorm.co.uk/
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debi
On Mon, Jan 26, 2009 at 02:17:39AM -0600, line...@ruiner.halo.nu wrote:
> Hi
>
> I have a relaively recent debian install with LUKS encrypted filesystem,
> default options.
>
> An error has been detected on the HD and it will not boot anymore, FSCK wants
> the root
On Mon, 2009-01-26 at 11:25 +0100, Johannes Wiedersich wrote:
> - From what you write, I have to assume that there is a good reason, why
> the person who installed the system did not give you the root password.
Isn't that normal if you choose to setup sudo during installation? I
don't think I've
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
line...@ruiner.halo.nu wrote:
> Hi
>
> I have a relaively recent debian install with LUKS encrypted
> filesystem, default options.
>
> An error has been detected on the HD and it will not boot anymore,
> FSCK wants the root
On Mon, 2009-01-26 at 09:17 +0100, line...@ruiner.halo.nu wrote:
> Hi
>
> I have a relaively recent debian install with LUKS encrypted filesystem,
> default options.
>
> An error has been detected on the HD and it will not boot anymore, FSCK wants
> the root password to
line...@ruiner.halo.nu wrote:
Hi
I have a relaively recent debian install with LUKS encrypted filesystem,
default options.
An error has been detected on the HD and it will not boot anymore, FSCK wants the root password to do system maintenence.
I do not know the root password and I would
2009/1/26 :
> Hi
>
> I have a relaively recent debian install with LUKS encrypted filesystem,
> default options.
>
> An error has been detected on the HD and it will not boot anymore, FSCK wants
> the root password to do system maintenence.
>
>
> I do not know the
Hi
I have a relaively recent debian install with LUKS encrypted filesystem,
default options.
An error has been detected on the HD and it will not boot anymore, FSCK wants
the root password to do system maintenence.
I do not know the root password and I would like to fsck the drive.
How can
On Tue, Jul 11, 2006 at 09:19:08PM +0100, Digby Tarvin wrote:
> Leading on from the earlier posters question about configuring an
> encrypted filesystem that does not interrupt the boot process with
> a password prompt...
>
> Can anyone tell me what the 'Debian way' is
* Anonymous <[EMAIL PROTECTED]> [2006-07-11 17:00:56 -]:
> I'd like to keep some of the data on my computer's hard drive
> encrypted, but not necessarily all of it. But I also need to be able
> to reboot the computer remotely and log into by SSH without the
> encrypted FS mounted, then mount t
Leading on from the earlier posters question about configuring an
encrypted filesystem that does not interrupt the boot process with
a password prompt...
Can anyone tell me what the 'Debian way' is to remove something
(in this case 'cryptdisks') from runlevel 'S'?
n and run
/etc/init.d/cryptdisks
enter the password, and finally mount the encrypted filesystem.
In my opinion it would be better if cryptdisks actually did the
mounting (as I believe /etc/init.d/boot.crypto does on SuSE).
It seems in Debian there is an assumption that someone will be
on
On Tue, 2006-07-11 at 17:00 +, Anonymous wrote:
> I'd like to keep some of the data on my computer's hard drive
> encrypted, but not necessarily all of it. But I also need to be able
> to reboot the computer remotely and log into by SSH without the
> encrypted FS mounted, then mount the encrypt
Anonymous on 2006-07-11 17:00:56 -:
> I'd like to keep some of the data on my computer's hard drive
> encrypted, but not necessarily all of it. But I also need to be able
> to reboot the computer remotely and log into by SSH without the
> encrypted FS mounted, then mount the encrypted partitio
I'd like to keep some of the data on my computer's hard drive
encrypted, but not necessarily all of it. But I also need to be able
to reboot the computer remotely and log into by SSH without the
encrypted FS mounted, then mount the encrypted partition in the SSH
session (from a trusted machine, of
On Thu, Apr 27, 2006 at 09:24:52PM -0500, Mumia W wrote:
> Digby Tarvin wrote:
> >[...]
> >Does anyone know if there is a way to capture all of the console
> >messages that are displayed during boot?
> >[...]
>
> Enable boot logging in /etc/default/bootlogd
That seems to do the trick - thanks.
R
Digby Tarvin wrote:
[...]
Does anyone know if there is a way to capture all of the console
messages that are displayed during boot?
[...]
Enable boot logging in /etc/default/bootlogd
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROT
On Thu, Apr 27, 2006 at 08:02:48AM -0400, Roberto C. Sanchez wrote:
> Digby Tarvin wrote:
> ...
> >
> >But I have no idea why the '.load' suffixes - and it would appear
> >that the system doesn't know either, because all it does is produce
> >a series of 'FATAL' messages on the console during boot.
Digby Tarvin wrote:
However it leads me on to another related question..
After the install (Etch, netinstall) the /etc/modules file
contained the following:
# /etc/modules: kernel modules to load at boot time.
#
# This file contains the names of kernel modules that should be loaded
# at
On 2006-04-27 05:09:35, Digby Tarvin wrote:
> I've been looking at mechanism for setting up an encrypted filesystem
> under Etch, and I have the basics working as follows:
...
> However it seems that I need to add an entry to /etc/modprobe.d in
> order to get the device mapper
On Thu, Apr 27, 2006 at 12:12:32PM +0200, Jochen Schulz wrote:
> Digby Tarvin:
> >
> > However it seems that I need to add an entry to /etc/modprobe.d in
> > order to get the device mapper module loaded. Or should it be
> > /etc/modules.conf or /etc/modules that I edit?
>
> Modules which you want
Digby Tarvin:
>
> However it seems that I need to add an entry to /etc/modprobe.d in
> order to get the device mapper module loaded. Or should it be
> /etc/modules.conf or /etc/modules that I edit?
Modules which you want to load at boot have to be named in /etc/modules
(one module name er line).
I've been looking at mechanism for setting up an encrypted filesystem
under Etch, and I have the basics working as follows:
a. Initial Setup
1. apt-get install cryptosetup
2. modprobe dm-mod
3. cryptsetup -y create chda14 /dev/hda14
4. mkfs -t ext3 /dev/m
en using absolute end relative
numbers. Using absolute numbers means that you cannot copy the encrypted
filesystem to a different place.
There seems to be another problem with the crypto patch and kernels
>=2.4.10: It simply doesn't work! (Probably because of the block device
in page cache changes)
Walter
On Fri, 2001-10-26 at 11:26, Gabor Gludovatz wrote:
> Hi,
>
> does someone know of a sulution which I could use to encrypt a filesystem
> transparently? I want my data to be encoded on the disk and I'd like to
> mount it at the same time, and access+modify it.
>
> In the good old times there was
On Fri, Oct 26, 2001 at 12:26:46AM +0200, Gabor Gludovatz wrote:
> Hi,
>
> does someone know of a sulution which I could use to encrypt a filesystem
> transparently? I want my data to be encoded on the disk and I'd like to
> mount it at the same time, and access+modify it.
>
> In the good old tim
Hi,
does someone know of a sulution which I could use to encrypt a filesystem
transparently? I want my data to be encoded on the disk and I'd like to
mount it at the same time, and access+modify it.
In the good old times there was a patch, the kerneli patch, with which I
could encrypt any filesys
Quoth Lance Simmons,
> I've looked at the archives but haven't found much helpful on this.
> Have other people had success at creating loopback encrypted
> filesystems?
If you don't want to mess around with patching kernels (and a few
userland apps, from memory), a good alternative is cfs, the
Cr
Lance Simmons wrote:
>
> I've looked at the archives but haven't found much helpful on this.
> Have other people had success at creating loopback encrypted
> filesystems?
Did you read the encryption-HOWTO ?
I can create the crypted-fs after reading the HOWTO..
Well, I have written a document ab
I've looked at the archives but haven't found much helpful on this.
Have other people had success at creating loopback encrypted
filesystems?
The international kernel patch includes how-to pages, but I don't seem
to be following the instructions. In particular, I'm not sure what
patch to use on th
84 matches
Mail list logo