On 11/26/2014 11:12 PM, Chris Murphy wrote:
On Wed, Nov 26, 2014 at 1:40 PM, santosh wrote:
I am using CentOS 6 and grub 0.97
1. Launched a Virtual Machine (VM) with CentOS 6. (This step is done.)
2. After the VM comes up, copy latest kernel and initrd from remote
server to /boot
On Wed, 26 Nov 2014 23:12:46 -0700 Chris Murphy wrote:
> On Wed, Nov 26, 2014 at 1:40 PM, santosh wrote:
> > I am using CentOS 6 and grub 0.97
> >
> > 1. Launched a Virtual Machine (VM) with CentOS 6. (This step is done.)
> >
> > 2. After the VM comes up, copy latest kernel and initrd from
On Wed, Nov 26, 2014 at 1:40 PM, santosh wrote:
> I am using CentOS 6 and grub 0.97
>
> 1. Launched a Virtual Machine (VM) with CentOS 6. (This step is done.)
>
> 2. After the VM comes up, copy latest kernel and initrd from remote
> server to /boot
> through a script present at /etc/init
On Wed, Nov 26, 2014 at 20:33:51 -0500,
Robert Moskowitz wrote:
On 11/26/2014 07:10 PM, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that
On 11/26/2014 07:10 PM, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that is encrypted using gpg. We can even say the flash drive
itself is
On Wed, Nov 26, 2014 at 20:47:25 +,
Bill Oliver wrote:
On Wed, 26 Nov 2014, Bill Oliver wrote:
Actually, let me be more specific. Let's say I have data on a flash
drive that is encrypted using gpg. We can even say the flash drive
itself is encrypted.
Now let's say that flash drive is st
On 11/26/2014 05:06 PM, Joe Zeff wrote:
On 11/26/2014 01:58 PM, Bill Oliver wrote:
Then I'd rely on decrypted backups, which are stored under physical lock
and key. Or, if necessary, I'd simply go back to the client and get the
data again. I do that a lot with paper files, since I burn them wh
On 11/26/2014 04:58 PM, Bill Oliver wrote:
On Wed, 26 Nov 2014, Joe Zeff wrote:
On 11/26/2014 12:47 PM, Bill Oliver wrote:
Now let's say that flash drive is stolen, lost, etc. *and* the
passphrase is compromised. I want the data on the flash drive to be
available *only on one computer* ev
Is there a way to alter key bindings so that key sequences
like Ctl+Alt+Fn (n=19) can be intercepted by GUEST and
be able to see a GUEST virtual tty?
Thanx.
--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mail
On 11/26/2014 01:58 PM, Bill Oliver wrote:
Then I'd rely on decrypted backups, which are stored under physical lock
and key. Or, if necessary, I'd simply go back to the client and get the
data again. I do that a lot with paper files, since I burn them when my
consultation is finished. Occasiona
On Wed, 26 Nov 2014, Joe Zeff wrote:
On 11/26/2014 12:47 PM, Bill Oliver wrote:
Now let's say that flash drive is stolen, lost, etc. *and* the
passphrase is compromised. I want the data on the flash drive to be
available *only on one computer* even if the passphrase is known.
What happens
Hi,
I believe that you have to go into:
/etc/syconfig/grub
and edit according to your needs.
Then you have to use:
sudo bash -x grub2-mkconfig -o /boot/grub2/grub.cfg
This should update grub for now and for ever.
Thanks!
Ranjan
On Thu, 27 Nov 2014 02:10:11 +0530 santosh wrote:
> I am us
On 11/26/2014 12:47 PM, Bill Oliver wrote:
Now let's say that flash drive is stolen, lost, etc. *and* the
passphrase is compromised. I want the data on the flash drive to be
available *only on one computer* even if the passphrase is known.
What happens when (not if) some piece of hardware dies
On 11/26/2014 12:43 PM, Bill Oliver wrote:
How do you mean "incorporate?" So you simply mean store a long
passphrase on the flash drive?
No, you store part of the passphrase on the flash drive and the other
part in your brain.
--
users mailing list
users@lists.fedoraproject.org
To unsubscrib
On Wed, 26 Nov 2014, Bill Oliver wrote:
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 17:39:34 +,
Bill Oliver wrote:
>
> For the HP issue, the fix is easy -- you just delete the command to
> check during boot up. But, I was thinking about this as an encryptio
How do you mean "incorporate?" So you simply mean store a long passphrase on
the flash drive?
billo
On Wed, 26 Nov 2014, jd1008 wrote:
That is quite easy.
Get a small thumb drive which are now almost free.
Put on it some random data (be sure that data is not
also on your HD).
So, when you
On Wed, 26 Nov 2014, Bruno Wolff III wrote:
On Wed, Nov 26, 2014 at 17:39:34 +,
Bill Oliver wrote:
For the HP issue, the fix is easy -- you just delete the command to check
during boot up. But, I was thinking about this as an encryption option --
where one could encrypt files in a way
I am using CentOS 6 and grub 0.97
1. Launched a Virtual Machine (VM) with CentOS 6. (This step is done.)
2. After the VM comes up, copy latest kernel and initrd from remote
server to /boot
through a script present at /etc/init.d/ (This step is done)
3. How to edit grub config file eit
On Wed, Nov 26, 2014 at 17:39:34 +,
Bill Oliver wrote:
For the HP issue, the fix is easy -- you just delete the command to check
during boot up. But, I was thinking about this as an encryption option --
where one could encrypt files in a way that automatically incorporates hardware
inf
That is quite easy.
Get a small thumb drive which are now almost free.
Put on it some random data (be sure that data is not
also on your HD).
So, when you encrypt, you incorporate that data into
the encrypted file(s), then remove the thumb drive.
On 11/26/2014 10:39 AM, Bill Oliver wrote:
I w
On Nov 25, 2014 9:56 AM, "santosh" wrote:
>
> Query regarding Booting Linux VM (Virtual Machine) from a network server
>
---
>
> I am interested to boot my VM with PXE BOOT through command line (not
> through GUI)
I was thinking about the infamous "code purple error" for HP computers, where Windows is
keyed to the hardware of the machine. If you swap out a hard drive or change a card, it won't
boot. Apparently, there is a "tattoo" of various hardware identifiers in static memory
somewhere and the OS m
On 26.11.2014 11:34, Ian Chapman wrote:
> On 25/11/14 20:40, poma wrote:
>
>>> Is svcrdma intentionally not built in the current kernels or has it been
>>> replaced by something else?
>>>
>
>> $ find -name config* -exec grep -H CONFIG_SUNRPC_XPRT_RDMA_SERVER {} \;
>> ./kernel-3.15.0-0.rc0.git12.1
On 25/11/14 23:03, Chuck Lever wrote:
Chuck, what is the current recommendation for 'CONFIG_SUNRPC_XPRT_RDMA_SERVER’?
The server in 3.17 and later kernels no longer crashes
regularly.
That's good, at least F20 is on 3.17+ now.
As to whether you should re-enable it, here’s full
disclosure:
Hi all,
Having this working configuration
[root@s220 network-scripts]# ls ifcfg-*
ifcfg-Bridge_connection_1 ifcfg-lo ifcfg-System_em1
[root@s220 network-scripts]# cat ifcfg-Bridge_connection_1
DEVICE=bridge0
STP=yes
BRIDGING_OPTS=priority=128
TYPE=Bridge
BOOTPROTO=none
IPADDR0=193.x.y.220
PREFI
On 25/11/14 20:40, poma wrote:
Is svcrdma intentionally not built in the current kernels or has it been
replaced by something else?
$ find -name config* -exec grep -H CONFIG_SUNRPC_XPRT_RDMA_SERVER {} \;
./kernel-3.15.0-0.rc0.git12.1.fc21.x86_64/boot/config-3.15.0-0.rc0.git12.1.fc21.x86_64:#
26 matches
Mail list logo