Ubuntu :: Using The "Passwords And Encryption Keys" The Export Menu Is Sensitive/disabled
Oct 19, 2010
I have a lot of passwords and keys for FTP and SSH connections that I need to keep. When using the "Passwords and Encryption Keys" the Export menu is sensitive/disabled.
I need to back them up, amongst other things, as I'll be re-partitioning my hard drive which will most likely result in a fresh install of Ubuntu.
View 1 Replies
ADVERTISEMENT
Jun 12, 2010
seahorse export menu is always disabled. I need to export the passwords to restore it after formatting my machine.
View 1 Replies
View Related
May 1, 2011
I just recently upgraded from 10.10 to 11.04, but using the classic desktop instead of unity, mainly because unity sucks big time, but that's a different story, anyway, when I used 10.10 I had a key setup for access to my remote SSH server, but now when I try to set up a new key using passwords and encryption, I get:- "Couldn't configure secure shell keys on remote computer", followed by:- '** (process:2532):WARNING **:couldn't open fd 27:Bad file desciptor' 3 lines of this with different process numbers then I got ''** (process:2535):WARNING **:couldn't open fd 27:Bad file descriptor: Permission Denied. Please try again'
I have not changed anything on the remote server at all. I can access SSH using PuTTy sucessfuly, but I want to set up a key using the ubuntu passwords and encryption key program, but since ugrading to 11.04 I can not do that for some reason.
View 4 Replies
View Related
Jun 7, 2011
I am not very security minded...I'm aware of it, and always made sure I had up-to-date overall protection in Windows but firewalls, and the blasted passwords are largely a thorn in my side!When I got my iPhone last year I suddenly discovered password managers & "wallets" to keep all that kind of information in and syncable across different devices. My life got so much easier. Of course now I need to figure out encryption keys, and how they work (I'm clueless). I also need to find a program or system that I can move my existing low-tech info (mailnly user name & passwords) that will also accomodate the increased needs of Ubuntu security and still be sync-able. I started a little research weeks ago, but my current "wallet" only exports .csv so I quit since I'm going to have to do a lot of data entry whatever I go with.So here goes:
1) what is the difference (bare bones) between using an encryption key (e.k.) vs. a standard user created password? what situations are better suited for e.k.?
2) I have seahorse (default intall with Ubuntu I guess) but the only thing in it is Login under passwords which leads to a login keyring (?) and a drop-down list of about 6-10 of the gazillon passwords I use daily. The other tabs are for keys which I don't have any concept of.
3) I know FF also "remembers" user id & passwords as you choose to have it do so. Is that information transferable into seahorse or another program?
4)I'm also (today) getting ready to really set up my system for user names & security across my little home network. How can I integrate that into whichever program/app I go with to store my pwds and keys?
5)give me links to fairly current documentation on this stuff?
6) Any program/app recommendations.Pros/cons uses, what they can & can't do or be used for, etc.
View 9 Replies
View Related
Jun 24, 2010
How do I, the rightful creater and owner of the Firefox master-password, convince Firefox to release my passwords to me? I'm aware that Firefox stores website-passwords in the personal information manager, and that I am able to view these after unlocking them with the master-password and export them with the profile info export function. However, I collect all my passwords and encrypt them with a very strong key for storage outside my PC.
View 3 Replies
View Related
Mar 11, 2011
Is it possible to have two passwords associated with one account, one that is the actual one, and another one, a duress password, that upon entering gives a similar (desktop) environment with "decoy data"?
The idea is to have the bogus password go to an encrypted home drive that looks as if it were the real deal, but it is wiping particular sensitive (encrypted) data that is visible only with the real password in the background, so that the actual data that need to be protected are not compromised. While the person who unlocked the computer tries to find the information on it between all the rubbish files, the real files are securely wiped. The files are very sensitive in nature, so it's better to have then destroyed than have unauthorized people access them, in the event of that happening.
I happen to know that TrueCrypt has a similar option but that requires an entire decoy operating system (and I think that might be a bit conspicuous), but is there a native linux way to do it?
View 1 Replies
View Related
Nov 26, 2009
I am just wondering what encryption method the shadow file uses, so that I may be able to manually change it. I ask this because I am trying to make a web page that will allow people to change their linux password via a browser.
View 4 Replies
View Related
Mar 10, 2010
I would like to be able to store all my important details and passwords in such a way that it is encrypted, easy to get the information out and is cross-platform. Basically, I am thinking that if I kick the bucket that I would like to make it as easy as possible for others to be able to access this information using a pre-arranged password.
Ideally I would like the files to contain the program that is needed to extract the data i.e. importantinfoLinux.sh inportantinfoWin.exe (Just like a self-containing zip). I haven't found anything along those lines.
The things I am currently thinking of is:
1) A password database program that is cross-platform like KeePass. WIth the bundle contining the relevant installers for win, linux and OS X and the database file.
2) An AES encrypted zip of the data with relevant programs to open it e.g. 7-zip on windows, peazip on linux and OS X
Has anyone got any thoughts on this? Any self-containing java encryption apps?
View 3 Replies
View Related
Jun 20, 2010
I'd like to know if there's a simple way to create a LUKS encryption drive with different passwords? A real one that leads to one set of data, and another that leads to a whole different set of data. Is this even possible with LUKS?
View 1 Replies
View Related
Nov 4, 2009
I'm looking to find out exactly how to go about changing the encryption method of shadow passwords from MD5 to something a bit stronger, like SHA. I've been looking around for a bit now and haven't found out how to do it. I've gathered that I'll most likely need to change the /etc/pam.d/system-auth file. Right now, there is a line that looks like this:
password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok.I'm guessing the md5 should be changed to something else, like sha256. What else? I know I'll need to reset all passwords once the change is made, but I thought there was someplace else that controls how the passwd command encrypts passwords.
View 1 Replies
View Related
Oct 4, 2009
i am wanting to put a list of common passwords on a usb stick, but i want the file to be password protected. I also need to be able to access it from more than one computer (all linux, maybe a mac too).
View 5 Replies
View Related
Jan 24, 2011
I am running hardy on my laptop and was thinking its time I upgraded. One thing that's been holding me back is I have a number of wifi keys stored in there somewhere and can't remember what they were exactly. Are they exportable?
View 3 Replies
View Related
May 11, 2011
How to disabling Encryption keys ?(ubuntu 10.10)
View 3 Replies
View Related
Aug 1, 2011
I have been using so far only 32bit ubuntu, but now for various reasons I have to change to 64bit I need to compile a lib for gpg encryption for handling old keys, namely .I have the idea.c file and had some instruction with which I was able to create the lib from it for the 32bit linux. The intruction was:
gcc -Wall -02 -shared -fPIC -o idea idea.c
this seems not to work under 64bit and the old lib does not work under 64bit either obviously. particularly the compiler tells me -02 option is unknown, does it matter? or what is -02 ?
View 3 Replies
View Related
Oct 22, 2010
I know this has probably been asked too many times here but I need to secure my emails. Personal matters of course. But yeah. I use the program "Password and Encryption Keys" to generate a key to sign my emails with but I do not know what to do. To be blunt, I'm stupid when it comes to this. IF not, steps in creating a key? and giving it (my public key) to the significant other? Finding where both keys are? Implementing it into Thunderbird? If it helps any here's some extra information: Ubuntu distro: Ubuntu 10.04 Email client: Thunderbird
View 7 Replies
View Related
Jan 13, 2010
this isn't really a security question, per se, so feel free to move. It is related to full disk LVM encryption though. Full disk didn't work for me with grub2 after running dd to a remote server, so I downgraded to grub1. No biggie. However, I have neither grub or grub2 as selected in Synaptic.Let's say I forget which I have installed. How would I determine what version of grub is installed at the moment. I'm assuming it's somehow installed on in the mbr but not on the OS. I didn't mean to do anything funky. Is that the normal setup? I'm deploying these systems to users and want to be able to troubleshoot issues in the future (hopefully that will not be needed!) grub --version does not work because it is not installed.
View 2 Replies
View Related
Jul 3, 2011
I installed digikam 1.4.0 I guess it's the last version on ubuntu 10.10. I can browse my photos but I cannot edit for example I have a jpg file, click edit all the menu like disabled, gray for example menu color, color balance is gray like curve /black and white and all the menu.
View 2 Replies
View Related
Jan 7, 2010
I wonder if it is possible to have two passwords for one user account in 9.10. I have a long login password (5 words about 45 characters with spaces caps). I would like to set a shorter password for Authentication, sudo, etc. While retaining the original for logging in.In short:Have long password to login to computer.Have short password for everything after login.
View 6 Replies
View Related
Oct 26, 2010
FC13
When rebooting and in Boot Selection Menu , the Arrow keys won't go down through kernel selections. They just won't move.
Is this a Linux or CMOS problem ?
View 1 Replies
View Related
Aug 22, 2010
The "Make Link" option is disabled in the context menu in Ubuntu 10.04. I want to make a hard link on the Desktop for my www folder.
I didn't have this problem in Linux Mint 8. I already tried the ln command. I also changed the owner and group that the folder belongs to, along with its permissions.
View 2 Replies
View Related
Jun 27, 2011
Just wondering if Ubuntu has an Accessibility equivalent for sticky keys and mouse keys.
View 1 Replies
View Related
Apr 17, 2010
I don't know if this is a configuration issue or a hardware issue, but I have a Kinesis Advantage USB keyboard and for some reason the F3-F5 keys aren't responding as they used to. They don't respond to anything and, when I tried using F5 on Emacs, it said <XF86AudioNext> is undefined, so I guess it's a weird mapping problem.
Any idea how I could remap them to the original meaning?
View 2 Replies
View Related
Apr 7, 2011
I'm running Debian (Squeeze) and I have a toshiba portege m700. It has five buttons on the front just under the screen, which are the only ones accessible when you flip the screen over into tablet mode. One of them is for rotating the screen, and another is for switching to external display. I want to remap the remaining three to control, alt and super so that I can use shortcuts with the stylusThe problem is, when I used showkey to find out the key codes, I found out that each button generates more than one key code:Button 1:
key 126 press >> super_r, although this is distinct from the actual super key (125)
key 7 press >> 6
key 7 release
key 126 release
View 4 Replies
View Related
Jun 12, 2011
I accidentally made a mistake of deleting the data I was suppose to shred. I cut and pasted sensitive documents from my external hard drive into my laptop. I want to shred those documents from my external hard drive but since I already did a cut/paste command those files are no longer accessible from my external hard drive. Is there a way I can fix this?
View 3 Replies
View Related
Feb 3, 2011
I recently used D�j� Dup for the first time. I chose to backup my home folder and most dot folders (do most of you backup all your home dir dot folders?). Even though D�j� Dup uses gpg, is there any sensitive data stored in dot folders within my home directory?
BTW, I did an incremental backup up to an older D�j� Dup backup folder on my NTSF external HDD and got an error. Is this because it is NTFS? I then did an incremental backup to a backup folder on my PC (ext4) and got no error. In the picture attached, would that setting mean the backup will continue to grow to a huge size? Would it be better to keep backups for a week?
View 1 Replies
View Related
Aug 20, 2010
The sort utility in Ubuntu 10.04 (Lucid) always sort by case-insensitive, just like if you specify --ignore-case to it. The two sort just give the same result:
[Code]....
But sometimes I want to sort by case-sensitive, so the upper-case letters come first, then lower-case letter.
View 2 Replies
View Related
Dec 14, 2010
i am trying to set up a couple of pages in some special directories URL...but i need it that if they type URL... for them also to go to the site and not to a 404
View 2 Replies
View Related
Jul 13, 2011
The touchpad on my Lenovo Z560 is to sensitive. I went into the mouse setting and adjusted the pointer speed sensitivity as low as possible but I don't see any difference. The lightest touch will move the pointer. I saw where some have modified the xorg.conf file but I can't find it in Ubuntu 11.04. From what I could find with Google this laptop uses a Synaptics touchpad. I installed Gpointing-device-settings and was able to change the speed but not the sensitivity. How can I make the touchpad less sensitive?
View 10 Replies
View Related
Jan 22, 2010
Anybody know of a way to search only for similar case sensitive files? By which I mean doing a wildcard search across a drive & the only results are like: Abc.txt abc.txt VID_001.avi Vid_001.AVI .. etc.
I've already tried searching the forums & google but the closest I've found is regarding files with increasing numbers (music_001.mp3, music_002.mp3, etc), which doesn't quite fit with my issue, as they would be seen as different files on a case insensitive OS.
View 2 Replies
View Related
Aug 23, 2010
I have a sh-tty B/G wireless card that does 500mw according to iwconfig. I also have a nice little panel antenna on this card that does 7dBi. This rig picks up a lot of signals and that is really great. However I am experiencing a problem. I am able to Internet browse on non-encrypted networks as long as the wireless manager shows a full four bars. However, if I try to connect to a three bar network, I will not be able to browse the Internet. I have a solid lower level 3 bars, I'm assigned an IP addy, but I get absolutely no throughput.
So, I think this has something to do with receiver sensitivity. In G mode, this card does a lousy -65ish or so at 54 meg. So what I'd like to do is drop to 5.5 or 11 meg B because at 5.5 meg or 11 meg B, the card does a much more acceptable 90+ sensitivity.Does anyone have the command string/app for this? I would like to force a card to operate in no better than 802.11B@5.5meg rather than having it auto select 802.11G@54meg.
View 1 Replies
View Related