I don't use the Trash bin because it does not really delete things,speaking from a security point Instead, I gotten used to 'shred' and 'secure-delete' .But to move around files, cut-n-paste is very handy.And I was wandering if items from the Clip get stored somewhere ?i realize that they get overwritten again and again in the clipboard but do they also get stored somewhere else?
I'm trying to clean a hard drive and I'm using secure-delete but it just stands there and takes cpu power but nothing happens, I used -r switch first and nothing, so I tried it on single files, small pictures worked as intended but a simple 50MB MPG file just stands there as well and nothing happens.
I left it running for 24 hours and nothing happened but the cpu was working at 90-100% all the time :/
Since all what I can find on google is about benchmarks I'd like to ask you if a 64 bit kernel would be more stable , secure and reliable than a 32 bit one.
I ask this question because apparently the 64 bit instruction set offers more advanced security features (i'm saying apparently because I'm not able to give details since it been a really fast read) which would be used by a 64 bit Operating System (Apple also stated that 64 bit applications are less likely to be "attacked").
I have to assume that a 32 bit one does not use them right? Should I stick to 64 bit? (to be honest that "not for everyday" thing on ubuntu download pages made me wonder lol, because since intrepid i ALWAYS used the 64 bit version)
My "lowest" computer has a pentium processor (1,6 ghz dual core) according to lshw I have NX enabled and my ram is 2GB (might seem useless using a 64bit kernel on 2 GB but i'm more concerned about security now)
I just want to upgrade my Slackware 13.1 kernel (18.104.22.168) to the latest stable kernel from kernel.org (22.214.171.124). I have never done anything like this and I am a Linux newbie, so I would appreciate a "Kernel Patching for Dummies" version if possible. I did do a search on this forum and most of what I read was over my head. I found an FAQ on kernelnewbies.org on "How To Apply A Patch" but when I attempted what they suggested, it said it couldn't find the file to patch at line 5 and asked me which file to patch. So I CTRL-Z'd out of there and came here. Here's what I tried:
I'm an Oracle DBA and started working for my current employer about 4 months ago. This past weekend an alert re: FS space brought my attention to /var/spool/clientmqueue (full of mail re: cron jobs) and the fact that sendmail is not running on our Linux servers.I'm told that the IT security team deemed sendmail too vulnerable so we don't run it.Aside from FS filling up and missing notification of issues with crontab entries, I'm concerned that we may be missing notification of potential issues. In other Unix/Linux environments I've seen emails from the print daemon when it experienced problems with specific jobs.
Are there other Linux facilities aside from cron and lpd that use email to advise the users of possible issues? Are there ways to secure sendmail or secure alternatives to sendmail? My primary need/desire is to make sure that emails regarding issues on the server get to the appropriate users. Secondary goal would be to have the ability to use mailx to send mail out. There is No need/desire to receive mail from outside.
there is an issue with the way the Linux Kernel addresses memory by default and the graphic drivers for my Asus G1Sn. I have a patch that I had compiled against a custom kernel for 2.6.27.xx how ever it does not work with the latest kernel in Fedora 11. It is beyond me to rewrite the patch to work with a different kernel.
I downloaded "secure-delete" from the Ubuntu Software Center, but it doesn't have any instructions, there is no website, and it does not appear in the Apps tab. I can't even begin to begin using it. How do I get this going? I haven't the faintest idea how to use the terminal programs.
i have an issue due to some high security requirements. what i want to do is to remove the files in trash folder permanently from the memory so that they cannot be recovered again. am aware of the "shred" command but i dont know if it can reach to files that are already in trash.I have found a solution but it requires to fill the whole unused memory with a file that consist of some ramdom bits and than deletes it:
I seem to be missing a secure.log or security.log file. I have Ubuntu 10.04 and can't find this file. I looked in the /var/log and ran a search command to no avail. Does anyone know where this file is or is it called something else. I'm looking for a file that logs any change to the security settings of the system.
I am trying to compile the iscsi-target software SCST. It wants me to apply a patch to my Linux kernel in order to allow for certain performance gains. The problem is I still new to Linux development. Where do I begin? How do I apply the patch? Do I need to recompile the kernel? I am running Ubuntu 10.04.3 amd64
I did the latest patch/update to lucid this morning and it would appear that my Volume control has gone missing from the task bar. There doesn't seem to be a volume control in Applications > Sounds & Video either. I am sure this has to do with the patch upgrade that I installed as everything was working fine before. For that matter, I had no system sounds either and it took a power off reboot for that to come back. My Music program (atunes) is not working properly either and keeps locking up. How do I reverse this patch or get my system back to a functional state?
Ok here's the problem : I tried to patch the kernel of my Debian server with GrSecurity but when I rebooted I couldn't SSH the server anymore, but my host has a rescue system that lets me SSH the server so I can fix things.
So maybe the kernel patching failed, maybe it's a only a problem with Grub.
I don't really know what to do to fix this. If I messed up the kernel what can I do ? Can I just fix the problem by modifying the grub entries to only boot on the old kernel (I don't even know if it's here anymore, I'm quite the n00b) ?
Well for now I'll just try to mount the partitions (won't let me do "mount: can't find /dev/sda1 in /etc/fstab or /etc/mtab" )
edit : to be clearer my main question is : how can I determine if it's because the kernel is messed up or because the system wouldn't boot properly ?
edit 2 : is there a way to create a log of what happens at boot so I can have an idea about what's wrong ?
IMO it really is the big thing! The patch being talked about is designed to automatically create task groups per TTY in an effort to improve the desktop interactivity under system strain. Mike Galbraith wrote the patch, which is currently in its third version in recent weeks, after Linus Torvalds inspired this idea. In its third form, this patch only adds 224 lines of code to the kernel's scheduler while stripping away nine lines of code, thus only 233 lines of code are in play. Tests done by Mike show the maximum latency dropping by over ten times and the average latency of the desktop by about 60 times.
This post concerns info found at [URL]. My question is: How do I get the patch. The author makes ref. to "his" git repo and the patch for TOR. I guess the patch allows the use of some compile time options that can harden the build. I looked through the change log of TOR and couldn't see any of the options referenced by Jacob in his post. I have read on the net that compile time hardening options are part of the gnu compiler, not the application to be compiled. Is this true?
I;m installing RTAI and I get this message. I can't seem to find the solution, because I really don't know exactly what the main problem is. There are a list of error,s and warnings that I 'm not sure from where should I tackle the problem: Here is what I get when I boot my 126.96.36.199 kernel with GRUB. (I used the RTAI x86 compatible patch):
I'm trying to make a 188.8.131.52 kernel using kernelcheck. I have custom compiled two previous kernels for maverick alone, so my .config it will load is optimized as I built with the localmodconfig option, and I have been using the 200 lines patch on my 2.6.35 kernels. I want to find the patch file that works on the 2.6.37 kernel for the 200 lines patch so I can optimize my speed, but the patch i found galbraith-patch is only for 2.6.36.
This morning I ran the automatic upgrade provided on the repositories, updating my kernel from 2.6.38-8 to 2.6.38-10.Unfortunately, upon reboot I discovered that a series of patches I'd applied in order to get my wireless card on my desktop working had been undone (see I had to run a modified version of the instruction set in order to get my wireless back on.My question: is there a way to trigger this every time the kernel upgrades? I'd hate to have to run this cumbersome set of commands manually every time.
I'm having problems to install SCST in Fedora 11.I'm not able to apply the kernel patch because there isn't a file called drivers/scsi/scsi_lib.c in the /usr/src/kernels/184.108.40.206-167.fc11.i868.PAE.Does anybody have an idea on how to proceed?
I have got a Ubuntu 11.04 (Codename natty) Kernel Version : 2.6.38-8-generic-pae. I want enable PoPToP PPTP + MPPE 128bit Encryption + MPPC Compression VPN Server on that. I am looking for patch for MPPE/MPPC support of the kernel 2.6.38-8 (Ubuntu 11.04 natty)