sadik Posted January 9, 2014 Report Share Posted January 9, 2014 Kali Linux introducing Emergency Self Destruct feature to Full Disk Encryptiontl;drOffensive-Security vor sa adauge un feature la full-disk encryption unde cu o parola speciala in loc sa decriptezi stergi hardul. Asta ar rezolva problema stickerului cu "Put nail through here!" in dreptul hardului. Inca se discuta daca ar trebui sa adauge optiunea asta. Pe blogul lor se poate vota:Emergency self-destruction of LUKS in Kali | Kali LinuxEnjoy! Quote Link to comment Share on other sites More sharing options...
tedeus Posted January 9, 2014 Report Share Posted January 9, 2014 Kali Linux introducing Emergency Self Destruct feature to Full Disk Encryptiontl;drOffensive-Security vor sa adauge un feature la full-disk encryption unde cu o parola speciala in loc sa decriptezi stergi hardul. Asta ar rezolva problema stickerului cu "Put nail through here!" in dreptul hardului. Inca se discuta daca ar trebui sa adauge optiunea asta. Pe blogul lor se poate vota:Emergency self-destruction of LUKS in Kali | Kali LinuxEnjoy!Thanks for voting!Add nuke features to cryptsetup ?Yes, add this feature!95%3351No, leave cryptsetup alone.4%124Stop bothering me1%45Spune tot nu? . Multumim de share! Quote Link to comment Share on other sites More sharing options...
aelius Posted January 9, 2014 Report Share Posted January 9, 2014 (edited) Pai ai codul la indemana, poti implementa singur absolut tot ce iti trebuie. E si 'how to' acolo. https://rstforums.com/forum/79735-emergency-self-destruction-luks-kali.rsthttp://thehackernews.com/2014/01/Kali-linux-Self-Destruct-nuke-password.html Edited January 9, 2014 by aelius Quote Link to comment Share on other sites More sharing options...
yo20063 Posted January 9, 2014 Report Share Posted January 9, 2014 (edited) https://rstforums.com/forum/79735-emergency-self-destruction-luks-kali.rstL-au bagat deja, am instalat eu aseara kali si era deja patch-uit, doar am generat a 2 a parola.//oricum daca faceti dual boot, sa stiti ca e putin "futing" cu instalarea criptata. De stiut:-trebuie creata neaparat o partitie de vreo 500mb pentru "/boot" necriptata-partitia principala "/" o criptezi-optional daca vreti partitie "swap", si aia trebuie criptata, ca daca nu o criptati riscati sa creati o vulnerabilitate in sistemul dumneavoastra. Edited January 9, 2014 by yo20063 1 Quote Link to comment Share on other sites More sharing options...
sadik Posted January 9, 2014 Author Report Share Posted January 9, 2014 @aelius sorry, nu stiam ca aveai topic deschis deja. @yo20063 sa instalezi un LVM criptat nu e mare chestie. ai boot 200-500 MB si restul LVM in care faci partitii. Am facut-o pe cateva sisteme Slackware si Arch. De cand am avut pc-uri cu cel putin 4GB RAM nu m-am obosit sa fac partitie swap. Mi se par inutile.Mai au vreo utilitate pentru uz normal cand ai peste 4GB ? De ex azi imi instalez Kali pe un sistem cu 12 GB. Merita sa ii fac swap, sau as observa vreo diferenta? Quote Link to comment Share on other sites More sharing options...
yo20063 Posted January 9, 2014 Report Share Posted January 9, 2014 @sadik nop...ai destul ram Quote Link to comment Share on other sites More sharing options...
aelius Posted January 9, 2014 Report Share Posted January 9, 2014 (edited) Sunt unele aplicatii care determina daca sistemul are swap sau nu. Nu functioneaza fara el. Daca ai SSD (sau orice alt storage rapid) si suficienta memorie, recomand un sysctl -w vm.swappiness=0 si sa pui 'vm.swappiness=0' in '/etc/sysctl.conf'Deci, poti pune un 512 MB swap (just in case). Daca ruleaza deja sistemul si nu vrei sa umblii la partitionare, poti face swap cu dd (imagine) Edited January 9, 2014 by aelius Quote Link to comment Share on other sites More sharing options...