Displaying 194 results for "xfdug5vmfi6oh42fp6ahhrqdjcf7ysqat6fkp5dhvde4d7vlkqixrsad" in 0.0022 seconds.
Page 3 of 4
DrugLab: Cheap, Good and Fast Drug Store
Large Selection. Fast Shipping. Worldwide. Cannabis Weed Hashish, MDMA Ecstasy, Cocaine, LSD, Heroin, Pharma Medics and many more
druglabr3ukbk47dkufxy6aa5qejf25ehdxji5t3bvwgrvbidukcdhqd.onion/?dh
Sponsored Ad
Encrypting your home directory using LUKS on Debian/Ubuntu
I was wondering about the passphrase LUKS requires to decrypt. Where should I setup it up to decrypt files upon user login? Thanks! Thanks for the info, but where do you enter the password when using this method? As long as your home direct...
pages tagged luks
No description
Recovering from an unbootable Ubuntu encrypted LVM root partition
A laptop that was installed using the default Ubuntu 16.10 (xenial) full-disk encryption option stopped booting after receiving a kernel update somewhere on the way to Ubuntu 17.04 (zesty). After showing the boot screen for about 30 seconds...
Manually expanding a RAID1 array on Ubuntu
Here are the notes I took while manually expanding an non-LVM encrypted RAID1 array on an Ubuntu machine. My original setup consisted of a 1 TB drive along with a 2 TB drive, which meant that the RAID1 array was 1 TB in size and the second ...
Encrypted swap partition on Debian/Ubuntu
The swap partition can hold a lot of unencrypted confidential information and the fact that it persists after shutting down the computer can be a problem. Encrypting a swap partition however is slightly tricky if one wants to also support s...
Poor man's RAID1 between an SSD and a hard drive
I totally agree that a RAID1 would kill the speed of SSD. But then, your post title says RAID1... Now, I wanted to mention that if you know the name of your device, you can check whether it's a rotational (HDD) or not (SSD). Here is an...
Encrypted system backup to DVD
Inspired by World Backup Day , I decided to take a backup of my laptop. Thanks to using a free operating system I don't have to backup any of my software, just configuration and data files, which fit on a single DVD. In order to avoid ...
Making the mounting of an encrypted /home optional on a home server
I have a computer that serves as a home server as well as a desktop machine. It has an encrypted home directory to protect user files and, in the default configuration, that unfortunately interferes with unattended reboots since someone nee...
Erasing Persistent Storage Securely on Linux
Here are some notes on how to securely delete computer data in a way that makes it impractical for anybody to recover that data. This is an important thing to do before giving away (or throwing away) old disks. Ideally though, it's bet...
pages tagged firebug
No description
pages tagged mercurial
No description
Mercurial commit series in Phabricator using Arcanist
Phabricator supports multi-commit patch series, but it's not yet obvious how to do it using Mercurial. So this the "hg" equivalent of this blog post for git users . Note that other people have written tools and plugins to do ...
Recovering from a botched hg histedit on a mercurial bookmark
Maybe it doesn't work when using bookmarks . Here's what I ended up doing to fully revert my botched Mercurial histedit . If you know of a simpler way to do this, feel free to leave a comment. Collecting the commits to restore - T...
Mercurial and Bitbucket workflow for Gecko development
While it sounds like I should really switch to a bookmark-based Mercurial workflow for my Gecko development, I figured that before I do that, I should document how I currently use patch queues and Bitbucket . Starting work on a new bug - Af...
pages tagged gmail
No description
Preventing man-in-the-middle attacks on fetchmail and postfix
First of all, you need to download the server certificate: Then copy the output of that command to a file, say gmail.out , and extract its md5 fingerprint: Once you have the fingerprint, add it to your ~/.fetchmailrc : Postfix - Similarly, ...
Keeping GMail in a separate browser profile
I wanted to be able to use the GMail web interface on my work machine, but for privacy reasons , I prefer not to be logged into my Google Account on my main browser. Here's how I make use of a somewhat hidden Firefox feature to move GM...
Things that work well with Tor
Tor is a proxy server which allows its users to hide their IP address from the websites they connect to. In order to provide this level of anonymity however, it introduces latency into these connections, an unfortunate performance-privacy t...
Disabling the GMail spam filter and handling it yourself using SpamAssassin
Now any items that would hit the Spam folder go directly to Trash and are automatically deleted in 30 days. QED - This tip is very usefull, specificaly when you want to manage your own spam filter. @RickyF : yes it's possible to delaga...
pages tagged debian
No description
Hardening ssh Servers
These are the settings that I use to harden ssh on my servers and clients. Basic server configuration - There are a few basic things that most admins will already know (and that tiger will warn you about if you forget): If you are using rkh...
pages tagged webrtc
No description
pages tagged asterisk
No description
Automatically rebooting for kernel updates
I use reboot-notifier on most of my servers to let me know when I need to reboot them for kernel updates since I want to decide exactly when those machines go down. On the other hand, my home backup server has very predictable usage pattern...
IndieAuth as a Persona Identity Provider
Two weeks ago, I attended Indie Web Camp and had lots of interesting Persona conversations. As part of an Auth Jam session , a few of us explored the idea of adding non- OAuth -based authentication mechanisms to IndieAuth . While Aaron and ...
Persona Guiding Principles
Given the impending shutdown of Persona and the lack of a clear alternative to it, I decided to write about some of the principles that guided its design and development in the hope that it may influence future efforts in some way. Permissi...
pages tagged videoconf
No description
pages tagged rackspace
No description
Blocked (queued) connections, keep-alive and content-length
So I decided to replace connect-gzip in that example with the standard compress middleware that is now bundled with connect . Unfortunately, because of the fact that the compress middleware needs to run before the rest of the response code,...
pages tagged openid
No description
pages tagged rt
No description
Formatting wiki pages
The number of # characters controls the size of the header: # h1 - ## h2 - ### h3 - #### h4 - ##### h5 - ###### h6 - To create a horizontal rule, just write three or more dashes or stars on their own line: To quote someone, prefix the quote...
pages tagged systemd
No description
pages tagged ssh
No description
pages tagged lirc
No description
Letting someone ssh into your laptop using Pagekite
In order to investigate a bug I was running into , I recently had to give my colleague ssh access to my laptop behind a firewall. The easiest way I found to do this was to create an account for him on my laptop, and setup a pagekite fronten...
Secure ssh-agent usage
ssh-agent was in the news recently due to the matrix.org compromise . The main takeaway from that incident was that one should avoid the ForwardAgent (or -A ) functionality when ProxyCommand can do and consider multi-factor authentication o...
pages tagged plupload
No description
pages tagged restic
No description
pages tagged ejabberd
No description
pages tagged launchpad
No description
pages tagged nginx
No description
pages tagged squid
No description
Using BrowserID and Content Security Policy together
Here's what I had to do to make BrowserID work on a CSP-enabled site. Create a hidden form and a login link - This is what the login button looked like before CSP: The hidden form is there because the assertion needs to be sent to the ...
pages tagged iptables
No description
pages tagged voipms
No description
pages tagged ssd
No description
Setting up your own DNSSEC-aware resolver using Unbound
Now that the root DNS servers are signed, I thought it was time I started using DNSSEC on my own PC. However, not wanting to wait for my ISP to enable it, I decided to setup a private recursive DNS resolver for myself using Unbound . Instal...
pages tagged duplicity
No description
pages tagged chromium
No description