According to Seagate, the password is set using the normal ATA
any link HOW such ata command look?
In the end it is always a cost/benefit (effort/threat) decision...
don't overdo it.
i am not paranoid :)
Being realistic however, if you offered 1000 random people a $1000 prize to
get into your system, using the BIOS AES disk encryption, it's unlikely any
of them would pull it off. With softraid, I am only lacking rootkit
protection, by doing a sha1sum on my /altroot partition, from the encrypted
sys
Si no puede visualizar correctamente este correo, le pedimos que lo arrastre a
su Bandeja de Entrada
Apreciable Ejecutivo:
TIEM de México
Empresa Líder en Capacitación y Actualización de Capital Humano
Le recuerda que el curso de:
Ortografía y Redacción para Ejecutivos
Esta programado en la Ci
I have been using softraid full disk encryption, with the exception of the
/altroot partition, on my laptop. I have no real threat. I just want it so
that if someone wants to go through my laptop, they can't without my
permission. With OpenBSD's full disk encryption, and a locking screen
saver, the
© 2012 Conference Corporativo S.C.
Incluye Temas Críticos Sobre:
Cierre de Gestión, Observaciones y Responsabilidades
Asista a los 45 Mejores Cursos en México de la Serie: CONTABILIDAD Y
FINANZAS Cursos, Contenidos y Metodologías Desarrollados en Alianza con
las Mejores Universidades Europeas con C
Contato Site Assunto: OrcamentoNome: Marcos S
SousaEmail: macossousa.compras@gmail.comTelefone: (11) 3904-
1478Mensagem: Bom dia gostaria de um orcamento sobre alguns
itens,que necessito com urgencia. Orcamento-doc.pdf
78K Visualizar Baixar
On Fri, 20 Jul 2012 21:55:52 +0200 (CEST)
Wojciech Puchar wrote:
> > There are certain Seagate Momentus disks that do AES encryption in
> > hardware. This means that they use an AES key to encrypt the data, and
> > you need a ("BIOS"-)password to unlock this key at boot. So whenever you
> > chang
There are certain Seagate Momentus disks that do AES encryption in
hardware. This means that they use an AES key to encrypt the data, and
you need a ("BIOS"-)password to unlock this key at boot. So whenever you
change the password, it's just that - the AES key stays the same. You
that's how all
On Fri, 20 Jul 2012 17:33:26 +0200 (CEST)
Wojciech Puchar wrote:
> > As your disk is probably not 'open source' (?), you don't
> > know if there is a really encryption, or if there is a secret
> > password (as for some bios) that permits to access data.
>
> thats exactly what i fear about. it is
Second that! Works great =)
> I have 5.0 and 5.1 working well, with 2 vCPU, on my ESXi 5.
>
> Cheers,
> Jo
Apreciable Ejecutivo:
TIEM de México
Empresa Líder en Capacitación y Actualización de Capital Humano
Ponemos a su disposición este excelente taller denominado:
Coaching Ejecutivo
Ciudad de México, el día 27 de Julio de 2012
Inscríbase 5 días antes de la fecha del Curso y obtenga un descuento
Hi,
Le 20 juil. 2012 à 19:29, Alessandro Baggi a écrit :
> Hi list,
> today I've installed OpenBSD 5.1 amd64 on a kvm (linux slackware) kvm
version is 1.0.1.
>
> Starting machine with 4 core, and bsd.mp it crash.
> Disabling mpbios see only one core and not smp.
>
> Then, I've updated kvm to 1.1.
Hi list,
today I've installed OpenBSD 5.1 amd64 on a kvm (linux slackware) kvm
version is 1.0.1.
Starting machine with 4 core, and bsd.mp it crash.
Disabling mpbios see only one core and not smp.
Then, I've updated kvm to 1.1.1 but the results are the same.
There is someone that has started
available through my local network) those mounted by hotplug-diskmount
are missing. I can't see any of this dirs. If I export these dirs
in /etc/exports for NFS, then I see this dirs but no content is shown
inside them.
NFS AFAIK will never work this way.
reload mountd after mounting new device
Hi all:
I have one computer acting as NFS server for some directories. One of
these directories is /vol, where the hotplug-diskmount daemon mounts
external disks (usually FAT32).
The problem is that whereas NFS is working well (rest of dirs are
available through my local network) those mounted b
As your disk is probably not 'open source' (?), you don't
know if there is a really encryption, or if there is a secret
password (as for some bios) that permits to access data.
thats exactly what i fear about. it is even possible that there are no
encryption at all.
Keep in memory that, wha
Hello Otto,
I was confused if I could start it manually or not. There was
indeed a little mistake in the configuration regarding the paths of the
certificate.
It's now solved.
Thank you to both of you
- Mail original
-
> De : Otto Moerbeek
> À : Mik J
>
Cc : "misc@openbsd.org"
> Envoy
well...
every problem has its solution -- eventually.
i have noticed first that if i dont start an xsession
(as in only xdm is on), the load can go under 1.00
but the reason couldnt be Xorg, as that is running
already if xdm is started. so i started suspecting
the programs in my .xsession.
and
On Fri, Jul 20, 2012 at 12:20:38PM +0100, Mik J wrote:
> Hello David,
> Yes I did create it, if there is a configuration problem then I
> don't see anything in the logs.
> I'm wondering how to debug this.
Start apache on the command line as httpd and you'll probably see the error.
-Otto
Hello David,
Yes I did create it, if there is a configuration problem then I
don't see anything in the logs.
I'm wondering how to debug this.
- Mail
original -
> De : David Diggles
> À :
misc@openbsd.org
> Cc :
> Envoyé le : Vendredi 20 juillet 2012 11h07
>
Objet : Re: Re : Apache won'
Thx its working on 5.1 but insted
/etc/kbdtype
pl
i did /etc/wsconsctl
keyboard.encoding=pl
On Fri, 20 Jul 2012 12:24:07 +0200, Adam Bryt wrote:
> On Thu, Jul 19, 2012 at 08:51:49PM +0200, Tomasz Marszal wrote:
>> Hi Group.
>> I have a question to polish users how to set up polish encoding
Le 20/07/2012 11:12, Wojciech Puchar a écrit :
> Many today SSD and some magnetic disks have AES-128/256 encryption
> builtin.
>
> If BIOS supports it, it ask for password then send it to hard disk
> after which it decodes it's AES key so it start to work.
>
> No software crypto overhead, everythin
* Adam Bryt [120720 10:56]:
> In ksh i can type polish signs in filenames (but 'ls' dont display it
> correctly).
Install colorls or use ls | cat.
--
Alexander Polakov | plhk.ru
On Thu, Jul 19, 2012 at 08:51:49PM +0200, Tomasz Marszal wrote:
> Hi Group.
> I have a question to polish users how to set up polish encoding in terminal
> in x windows in Open BSD 5.1 i386.
> LC_ALL and LC_LOCALE didnt work (works only in bash and i get strange signs
> instead of polish dialect si
Many today SSD and some magnetic disks have AES-128/256 encryption
builtin.
If BIOS supports it, it ask for password then send it to hard disk after
which it decodes it's AES key so it start to work.
No software crypto overhead, everything fine.
My question - how secure it really is.
One ex
Maybe a stupid question, but did you create the certificate the steps in the
FAQ?
http://www.openbsd.org/faq/faq10.html#HTTPS
On Fri, Jul 20, 2012 at 09:23:53AM +0100, Mik J wrote:
> Hello,
>
> I'm coming back with this Apache startup that works fine but yesterday
> I added the -DSSL option in
ESCUELA SISTÉMICA ARGENTINASEMINARIO TALLERAgosto / Septiembre 2012
HIPNOTERAPIA ERICKSONIANA Y PSICOLOGÍA POSITIVA
CONSTRUYENDO EL ESTADO POSITIVO SUSTENTABLE EN PSICOTERAPIA
Hello,
I'm coming back with this Apache startup that works fine but yesterday
I added the -DSSL option in /etc/rc.conf but Apache won't start
#
/etc/rc.d/httpd start
httpd(failed)
I've looked at all the logs I could find
but couldn't see why it failed. Is Apache SSL with lpthread supposed to work
The previous tests were reading from striped disks 4 spindles,
writing to /dev/null
This is the best so far, with fetching 4 compressed 500MB files
on a remote ramdisk, local output going to /dev/null
All on 10GigE in the same room.
OUTDIR: [/dev/null] SSH Options: [-o Ciphers=arcfour128 -o
MAC
Thanks Christian
Specifying the MAC you suggested makes a big jump in performance.
SSH Options: [-o Ciphers=arcfour128 -o MACs=umac...@openssh.com]
98.65026953028924143858 MB/s
94.75118186708754888342 MB/s
93.67964795503113387533 MB/s
77.35326700132979443792 MB/s
SSH Options: [-o Ciphers=arcfour
30 matches
Mail list logo