You are not logged in.
^ What is sudo?
I have no idea...
$ sudo -i
ksh: sudo: not found
$ man sudo
man: No entry for sudo in the manual.
$ which sudo
which: sudo: Command not found.
Offline
@ ostrolek,
A dyslexic Japanese wrestler.
“Yesterday is history, tomorrow is a mystery and today a gift...
That's why they call it the present"
― Master Oogway
Offline
Jmo ... HOAS knows what he's doing.
Any bank worthy of calling itself a bank or offering internet services is bound to have many bases covered, add HOAS to the mix and that imo, will no doubt magnify/mitigate any security concerns involved.
Don't know much about UK banking ( outside of how it's impacted the devel of the USA and resulting banking system.) But seriously doubting they are slouches n terms of conducting online bizness. Also any banking institution worth the name will have both multiple protections in place and fraud protection.
Footnote ... this obviously has nothing to do with distro-hopping.
Last edited by BLizgreat! (2015-12-13 23:35:58)
Offline
ostrolek wrote:I used a Linux live iso to add, delete, change files in system32 etc.
+1
I used to get rid of Internet Explorer that way ]:D
Or hack a Windows password
Offline
... imbecile.
You rang m'lord?
Postpone all your duties; if you die, you won't have to do them ..
Offline
^ No, I said "whinging imbecile". Never seen you whinge here.
Be excellent to each other, and...party on, dudes!
BunsenLabs Forum Rules
Tending and defending the Flame since 2009
Offline
^Haha, I had to look up the word "whinge" in the dictionary
One never knows when he will learn something new
Postpone all your duties; if you die, you won't have to do them ..
Offline
^ I suppose running as root is OK for live sessions or for other situations where you (or somebody else) can't accidentally your whole system. (Pick whichever verb you want; it applies.) Suppose, for example, you've forgotten to trigger the lockscreen on your laptop when you step away to order a vente at your favorite bistro and some random passerby gets curious about an unmounted drive that has sensitive info or pr0n on it; you'll be happy that your polkit requires your password to mount it.
Be excellent to each other, and...party on, dudes!
BunsenLabs Forum Rules
Tending and defending the Flame since 2009
Offline
^ Whether you leave your computer on while you are away, or it gets stolen or whatever, with a Linux live iso anyone can get inside your computer and do anything in it. Maybe, you can have a encripted home partition/folder, but most times you can look inside that too from a Linux live iso. If your bios is encrypted, maybe it would be hard to boot the live iso, but the bios also can be refreshed mechanically.
Using a live iso is also dangerous, as it (or the user) can take over your computer. When you are installing a distro from live iso, you are allowing it to take over. You are not the master, but the installer is the master.
Last edited by nobody0 (2015-12-16 17:29:32)
Offline
Have you guys tried Elementary OS? The latest is 0.3.2.
Its created over Ubuntu Trusty (sources.list) and has a repo with Elementary configs in Launchpad (sources.list.d).
Offline
I looked back through this thread, but couldn't find who suggested Star Geneses:
http://sourceforge.net/projects/linnix/
Thank you.
Thunar
Oracle VM
Geany
Iceweasel
tint2
Add a couple of programs like GIMP and I could move right in.
If you like #!, BL Openbox (and I think we do) give it a spin.
8bit
^ If you write Crunchbang in the search box in Sourceforge, you can find quite a few *bang distros there with Openbox.
Offline
Interested to see what these guys do: http://papyros.io/
Knowledge Ferret
Offline
^ This caught my eye It looks like I have some late night readming material now.
Offline
I downloaded Tails 1.8 (see: https://tails.boum.org/) and am running it in VB; however, I'm not totally convinced it is as anonymous and secure as claimed.
Offline
^ This caught my eye It looks like I have some late night readming material now.
That's serious. And AMD is not safe either (go to pg 44). We'll have to switch to Raspberry Pi or ARM tablets.
Offline
I downloaded Tails 1.8 (see: https://tails.boum.org/) and am running it in VB; however, I'm not totally convinced it is as anonymous and secure as claimed.
Download Tor browser, https://www.torproject.org/projects/tor … #downloads
You can browse the internet from at least a 4th country. Only, it doesn't mean you are all that safe, if you have anything to hide.
Offline
^The TOR browser comes with Tails.
Offline
tknomanzr wrote:^ This caught my eye It looks like I have some late night readming material now.
That's serious. And AMD is not safe either (go to pg 44). We'll have to switch to Raspberry Pi or ARM tablets.
Keep in mind that the rPi's entire bootstrap process is controlled by a proprietary blob. I think the main point I caught is that regardless how secure your OS, if the underlying hardware and drivers that control it are not secure, then you really can't consider the system secure. And once you add layers of encryption to the code which is at or near Assembly level, it becomes extremely difficult to even detect the vulnerabilities.
At one point in discussing this topic in the past, I learned about coreboot, which is a FOSS replacement for bios/uefi. I found it interesting that the project arose out of the Los Alamos National Labs and is sponsored by them. This immediately told me that the government is just as concerned about this topic as some of us might be. Given the difficulty of guaranteeing 100% security on machines that house information that absolutely does not need to end up in the wrong hands, we can begin to see why. However, convincing hardware vendors to open up their code to review is probably not gonna happen.
Now, there is the poor IT guy in government trying to secure an OS that is essentially not securable trying to say one thing, then you have your average senator whose eyes glaze over two minutes into a talk like that who somehow interprets that as being "We need back doors in everything so we can catch teh terrorists!" Just another spin on the difficulty of a tech guy trying to translate a difficult technical problem to management and have the message understood.
However, I think we all know that the more you attempt to secure your system, the more you tend to fingerprint it and make it something worth paying attention too. The average computer user, without special circumstances in play would be best served through the old and tired security through obscurity model.
Offline