dim indirect light from behind the screen is best IMO and that’s also enough to find that rare key, as well as your drink without knocking it over and causing havoc.
There are sites that respect the “do not track” setting of the browser and just display a small timed info on your first visit that cookies have been rejected. Examples: geizhals.eu , geizhals.de
Even though comments are very helpful, often it’s even enough to name variables and methods/functions really good. At least do that. You don’t want i, j and value. Believe me. You want rowCount, colCount and deliveryOption instead. You just may not know it now, but you will, when it has to be changed in a few months.
Alt text: Michael Scott Handshake meme. Managers text: “My company Congratulating me on avoiding a phishing test email”. Michael Scott text: “Me, terminally behind on answering email.”
There is, but if one gets through, they want us to forward it to this account that will be used to train, fine tune and improve the scanner for all mailboxes, as well as security training for employees.
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object....
I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.
LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
A good pasphrase helps the same for non-LUKS, but they still don’t have that specific weakness.
You can use cryptsetup without LUKS. However, something that starts to decrypt has to be unencryoted, so you can enter the password. Depending on how convenient it is for the user, it will leak some helpful info, like for example that the target is a valid file system that can be mounted or what cipher had been used.
to conceal this, you’d have to enter all it does manually in a shell/script without history. You could also add a number of bytes to skip as a sort of extra password and fill the start with random bytes, so it’s harder to find the start of the payload that is peobably a file system.
If you use X and need to restart it, you can probably preemptively use XPRA to proxy your Xclients and move them to the new Xserver, except maybe for those that need low latency or DRM (e.g. games)
Alt text:Twitter post by Daniel Feldman (@d_feldman): Linux is the only major operating system to support diagonal mode (credit [Twitter] @xssfox). Image shows an untrawide monitor rotated about 45 degrees, with a horizontal IDE window taking up a bottom triangle. A web browser and settings menu above it are organized creating a...
Hi, everybody Recently, a guy noticed that I was using it and asked why? For me it because in Linux many things are done through the terminal because Linux has many different desktop environments...
I don’t actually use it that much to input commands, but many scripts I made pop one up to show details of what’s happening, e.g. how opening the VPN connection is going, what crypto module it’s currently loading or how many more iterations a macro will do.
ifn't (programming.dev)
Just got my new favorite needle minder! (lemmy.world)
I liked it so much I actually got 2 of them lol
The Perfect Solution (programming.dev)
Why would I need backlit keys anyway? (lemmy.ml)
Came up with this late at night. Not while being anywhere near a laptop though.
Don't think my phone runs Nvidia... or Wayland 🤔 (sh.itjust.works)
Reddit must share IP addresses of piracy-discussing users, film studios say (arstechnica.com)
One of the most annoying things on the Internet (lemmy.world)
Hey, have you ever heard of Pop!_OS? (civilloquy.com)
Pudding used to come in cans (lemmy.world)
deleted_by_moderator
Rare uttar pradesh good news :Lesbian Couple From Bengal Marries At UP Temple (www.ndtv.com)
In case of emergency, open crisps bag (lemmy.world)
Source: …tumblr.com/…/no-crisps-only-toby-this-is-a-redra…
I use a WM btw (lemmy.world)
When you forget to set a boundary conditions in your logic (programming.dev)
915 days a year 😂...
Revisiting code I wrote last year (lemmy.world)
New email from test@scam.com (lemmy.blahaj.zone)
Alt text: Michael Scott Handshake meme. Managers text: “My company Congratulating me on avoiding a phishing test email”. Michael Scott text: “Me, terminally behind on answering email.”
deleted_by_author
How to luks encrypt raid drive?
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object....
eGPU docks?
Hi all,...
Good luck web devs (lemmy.world)
Alt text:Twitter post by Daniel Feldman (@d_feldman): Linux is the only major operating system to support diagonal mode (credit [Twitter] @xssfox). Image shows an untrawide monitor rotated about 45 degrees, with a horizontal IDE window taking up a bottom triangle. A web browser and settings menu above it are organized creating a...
How could the EU do this?? (lemmy.world)
Why do you use the terminal?
Hi, everybody Recently, a guy noticed that I was using it and asked why? For me it because in Linux many things are done through the terminal because Linux has many different desktop environments...