On Mon, Jan 12, 2015 at 7:32 AM, Iain M Conochie wrote:
>
> On 10/01/15 20:31, Brian wrote:
>>
>> By all means advocate and use ssh keys. But at least provide some
>> substantial reason for spurning password login for that particular
>> situation. A blanket "don't use passwords" or "keys are bette
On Mon, 12 Jan 2015 17:24:41 +0900
Joel Rees wrote:
> The only truly secure computer is the one that you wrote all the OS
> and application code for.
*And* the compiler(s) and the rest of the build toolchain... *and* the
BIOS, *and* the code for any network hardware you use...*and* the
firmware
Hi,
I've recently switched to using one of my screens in vertical
orientation. This is fine from the desktop (after login), but currently
the greeter displays on the vertical screen but on it's side.
Is it possible to move the greeter to the other screen, which is
horizontal or rotate the greeter
On Sun, Jan 11, 2015 at 11:38:58PM +0100, Hans wrote:
> Hello list,
>
> is there an information site, which or where I can subscribe, to get
> informed,
> when packages are put off the repo and its reason for it?
Yes. https://ftp-master.debian.org/removals.html
>
> Thanks for any infos.
>
>
On 01/12/2015 04:18 AM, Joe wrote:
On Mon, 12 Jan 2015 17:24:41 +0900
Joel Rees wrote:
>The only truly secure computer is the one that you wrote all the OS
>and application code for.
*And* the compiler(s) and the rest of the build toolchain...*and* the
BIOS,*and* the code for any network
On Mon, Jan 12, 2015 at 09:18:10AM +, Joe wrote:
> On Mon, 12 Jan 2015 17:24:41 +0900
> Joel Rees wrote:
>
>
> > The only truly secure computer is the one that you wrote all the OS
> > and application code for.
>
> *And* the compiler(s) and the rest of the build toolchain... *and* the
> BIO
On 01/12/2015 12:01 PM, Daniel Lintott wrote:
Hi,
I've recently switched to using one of my screens in vertical
orientation. This is fine from the desktop (after login), but currently
the greeter displays on the vertical screen but on it's side.
Is it possible to move the greeter to the other s
On Mon, Jan 12, 2015 at 12:46:55AM -0500, kamaraju kusumanchi wrote:
> I have always used bash as it is the default shell on Debian. However,
> I started using zsh couple of days ago and find it pretty impressive.
Have a look at this:
http://grml.org/zsh/zsh-lovers.html
At the very end there's
On 12/01/15 11:48, Alex Mestiashvili wrote:
> I use lightdm with option display-setup-script:
>
> display-setup-script=/etc/fixscreen.sh
>
> cat /etc/fixscreen.sh:
> #!/bin/sh
> /usr/bin/xrandr --output DP-1 --rotate left
>
> execute xrandr in your x session to get the output names.
Tha
On 2015-01-12 08:24, Joel Rees wrote:
On Mon, Jan 12, 2015 at 7:32 AM, Iain M Conochie
wrote:
On 10/01/15 20:31, Brian wrote:
By all means advocate and use ssh keys. But at least provide some
substantial reason for spurning password login for that particular
situation. A blanket "don't use p
Hi,
I have an annoying refreshing/redrawing issue with my monitor screen LG Flatron
L222WS
on my Wheezy (Nvidia GT 640 with last proprietary driver installed).
The screen, pretty much all the time, does not refresh the image (does not
redraw it) :
the screen stays idle for example when I change
On Mon, 2015-01-12 at 11:01 +, Daniel Lintott wrote:
> Hi,
>
> I've recently switched to using one of my screens in vertical
> orientation. This is fine from the desktop (after login), but currently
> the greeter displays on the vertical screen but on it's side.
>
> Is it possible to move the
On 1/12/2015 8:05 AM, i...@thargoid.co.uk wrote:
>
> While it is possible to enforce certain password policies (e.g. must use
> capital letters, numbers, symbols etc) these
> do not necessarily dictate a secure password. I guess if I know you
> phone number, if it is stored in my phone I have
> it
peter@dalton:~$ grep GRN /etc/fstab
LABEL=GRNSDHC41 /home/peter/GR auto defaults,noauto,user,users 0 0
peter@dalton:~$ mount LABEL=GRNSDHC41
mount: must be superuser to use mount
peter@dalton:~$ sudo mount LABEL=GRNSDHC41
[sudo] password for peter:
peter@dalton:~$ mount | grep GR
/dev/sda1 on /ho
On Mon, Jan 12, 2015 at 09:19:58AM -0500, Jerry Stuckle wrote:
> On 1/12/2015 8:05 AM, i...@thargoid.co.uk wrote:
> >
> > Nope - I am pretty sure it is something I am, within the context of the
> > above statement.
> >
>
> A fingerprint is something you HAVE. It is present on your body; it is
>
On Mon, Jan 12, 2015 at 06:18:13AM -0800, pe...@easthope.ca wrote:
> peter@dalton:~$ grep GRN /etc/fstab
> LABEL=GRNSDHC41 /home/peter/GR auto defaults,noauto,user,users 0 0
>
> peter@dalton:~$ mount LABEL=GRNSDHC41
> mount: must be superuser to use mount
The "user" option SHOULD allow this. What
peter@dalton:~$ grep GRN /etc/fstab
LABEL=GRNSDHC41 /home/peter/GR auto defaults,noauto,user,users 0 0
peter@dalton:~$ mount LABEL=GRNSDHC41
mount: must be superuser to use mount
peter@dalton:~$ sudo mount LABEL=GRNSDHC41
[sudo] password for peter:
peter@dalton:~$ mount | grep GR
/dev/sda1 on /ho
> IMAP allows retrieving a message, and IMAP allows deleting a message, so
> this can certainly be done. (As long as the server actually respects the
> delete command, rather than archiving on delete or something like that,
> but that would be server-specific.)
> ...
> I imagine that various other
Forwarding to the list as I seemed to have managed to leave it off.
Apologies.
Knowledge is easier to duplicate than a physical item. You mentioned
the
ATM attack.
Incorrect. Knowledge cannot be duplicated if there is no basis for
that
knowledge.
For instance, it was not possible for a
* From: Andrei POPESCU em concurrently. Someone might
work with a smartphone and a desktop system concurrently for
example. IMAP is useful there.
In a simpler but similar case, an mbox file can be on a flash
storage card which is shifted from one machine to another not
too frequently.
On 1/12/2015 10:10 AM, Chris Bannister wrote:
> On Mon, Jan 12, 2015 at 09:19:58AM -0500, Jerry Stuckle wrote:
>> On 1/12/2015 8:05 AM, i...@thargoid.co.uk wrote:
>>>
>>> Nope - I am pretty sure it is something I am, within the context of the
>>> above statement.
>>>
>>
>> A fingerprint is somethin
On 1/12/2015 11:36 AM, i...@thargoid.co.uk wrote:
> Forwarding to the list as I seemed to have managed to leave it off.
> Apologies.
>
>
>>
>>> Knowledge is easier to duplicate than a physical item. You mentioned the
>>> ATM attack.
>>
>> Incorrect. Knowledge cannot be duplicated if there is no
On Sat, Jan 10, 2015 at 02:09:02PM +0100, Hans wrote:
> To all these thoughts, what do you advice me to install? Better unstable than
> testing? I know, youi will now say "stable" but stable is sometimes just too
> old for a desktop (for example I had problems with the installation on
> notebook
On 01/12/2015 11:50 AM, Jerry Stuckle wrote:
You should learn from some REAL security experts, not the internet.
Like who? There are compromises all over the net, with consumer security
files lying in the open like gutted bleeding fish. I don't think anyone
is a "REAL security expert", exce
On Sun 11 Jan 2015 at 16:43:34 -0700, Bob Proulx wrote:
> Brian wrote:
> > Bob Proulx wrote:
> > > Complete agreement. I want to go further and say that a password that
> > > you can remember without needing to write it down is probably not a
> > > good password.
> >
> > Security of an ssh login
On 12/01/15 16:50, Jerry Stuckle wrote:
On 1/12/2015 11:36 AM, i...@thargoid.co.uk wrote:
Forwarding to the list as I seemed to have managed to leave it off.
Apologies.
Knowledge is easier to duplicate than a physical item. You mentioned the
ATM attack.
Incorrect. Knowledge cannot be dupli
On 12/01/15 16:41, Jerry Stuckle wrote:
On 1/12/2015 10:10 AM, Chris Bannister wrote:
Oh, come on!
http://www.thefreedictionary.com/context
It is all about *who* you are, or claim to be.
https://danielmiessler.com/blog/security-identification-authentication-and-authorization/
You have comp
On 01/12/2015 02:47 AM, Joel Rees wrote:
On Sun, Jan 11, 2015 at 4:37 AM, Ric Moore wrote:
You all may wish to read this, from ars technica:
http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/1/
Very interesting. So interesting that I downloaded cudahas
hi
i am using compaq 32bit desktop. i am new user of debian 5. i am using wifi
USB TL- WN727N its woks fine in xp but not working in debain5. i am new in
linux debian5 plz tell me all steps which i follow and easily install
driver. tell me installation process with complete commands.
thanx
regards
On Sat, Jan 10, 2015 at 12:33:36PM +0100, Johannes Schauer wrote:
>
> I'm not subscribed, so please keep me CC-ed.
>
> I'm unable to boot my laptop with systemd which worked before. I'm unable to
> tell the changes I made since the last time it worked because according to my
> uptime, the last ti
As I understand on an AMD64 system, when i386 multi-architecture is
"enabled" and apt-get update is run, nothing gets installed until one
installs some 386 app, etc., and then only those i386 dependencies
specific to, and necessary for THAT app are installed. Nothing else.
So, for example, a 386
On Tue, Dec 30, 2014 at 07:14:19PM +0100, Bernhard Frühmesser wrote:
> Hello,
>
> For a friend i setup a small RAID-1 config using Wheezy on one of his old
> machines, just to backup his most important stuff. Unfortunately the
> location where the box is placed can not be reached via cable because
On Monday 12 January 2015 20:59:07 zaheer ahmed wrote:
> hi
> i am using compaq 32bit desktop. i am new user of debian 5. i am using wifi
> USB TL- WN727N its woks fine in xp but not working in debain5. i am new in
> linux debian5 plz tell me all steps which i follow and easily install
> driver. te
2015/01/13 5:45 "Ric Moore" :
>
> On 01/12/2015 02:47 AM, Joel Rees wrote:
>>
>> On Sun, Jan 11, 2015 at 4:37 AM, Ric Moore wrote:
>>>
>>> You all may wish to read this, from ars technica:
>>>
http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/1/
>>>
>>> Ve
Hi,
Bear with me, this is a long email. Ideally, if you're reading it, you're
involved or interested in dracut. If you don't think anybody will read it here,
please point me to the right place.
My setup is: / is unencrypted, on /sdd1. /sdd2 contains a luks volume, which in
turn contains an lvm vo
Hajder Rabiee wrote:
> Trying to connect to VPN at work but keep getting: "vpnc: no response from
> target".
This is a typical response when the group name/password are incorrect.
IPSec ID
IPSec secret
Chris
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a s
Hi,
Am trying to get my webcam to work with the motion app. The webcam is working
fine with VLC, I can save the webcam's output to a file without any problems,
but the motion app fails with the same webcam with "Unable to find a compatible
palette format" error (see [1] below).
Some people see
On 01/12/2015 at 05:17 PM, Patrick Bartek wrote:
> As I understand on an AMD64 system, when i386 multi-architecture is
> "enabled" and apt-get update is run, nothing gets installed until one
> installs some 386 app, etc., and then only those i386 dependencies
> specific to, and necessary for THAT
2015/01/13 5:04 "Ric Moore" :
>
> On 01/12/2015 11:50 AM, Jerry Stuckle wrote:
>
>>
>> You should learn from some REAL security experts, not the internet.
>
>
> Like who? There are compromises all over the net, with consumer security
files lying in the open like gutted bleeding fish. I don't think
Hi,
Quoting Selim T. Erdoğan (2015-01-12 22:38:08)
> On Sat, Jan 10, 2015 at 12:33:36PM +0100, Johannes Schauer wrote:
> > I'm unable to boot my laptop with systemd which worked before. I'm unable to
> > tell the changes I made since the last time it worked because according to
> > my
> > uptime,
40 matches
Mail list logo