On Wed, Mar 20, 2024 at 1:32 AM wrote:
>
> On Wed, Mar 20, 2024 at 04:22:29AM +0800, jeremy ardley wrote:
>
> > A 'safer' implementation will not even expose an ssh port. Instead there
> > will be a certificate based VPN where you first need a certificate to
> > connect and then you need a separat
On Wed, Mar 20, 2024 at 04:22:29AM +0800, jeremy ardley wrote:
> A 'safer' implementation will not even expose an ssh port. Instead there
> will be a certificate based VPN where you first need a certificate to
> connect and then you need a separate certificate to log in as root. A
> further enhanc
On Tue 19 Mar 2024 at 13:09:55 (-0400), Henning Follmann wrote:
> On Tue, Mar 19, 2024 at 03:33:13PM +, fxkl4...@protonmail.com wrote:
> > i saw several instances of
> > "This option is ignored for initramfs devices and specific to the Debian
> > crypttab format. It's not supported by systemd.
Michael Kjörling <2695bd53d...@ewoof.net> wrote:
> For most values of "you", most attackers don't care about _your_
> account, or _your_ system; they care about _any_ account, or _any_
> system. Actually targeted attacks do happen, but very rarely compared
> to what might be thought of as attacker
On 19/03/24 at 15:43, Jesper Dybdal wrote:
My plan is to boot a rescue disk and mount that partition read-only. Then:
* If the file looks ok after reboot, then I'll strongly suspect the RAM
- and run memtest.
* Otherwise, I'll have to run fsck and see what happens.
kernel version:
root@nuser
On 19/3/24 23:02, Greg Wooledge wrote:
On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote:
The root user's password should be long (12 characters or more) and
impossible to guess. Indeed, any computer (and a fortiori any server)
connected to the Internet is regularly targeted by auto
On Tue, Mar 19, 2024 at 03:49:06PM +, debian-u...@howorth.org.uk wrote:
> Dan Ritter wrote:
> > Check whether you are running ssh:
> >
> > /sbin/service ssh status
>
> It's not called ssh; it is sshd
> Also nowadays it's more usual to say
>
> $ systemctl status sshd
On Debian, the systemd
On 19 Mar 2024 17:42 +0300, from daydreamer199...@gmail.com (Jan Krapivin):
> The thing is my password is very easy now, and i haven't thought about
> *"automated
> connection attempts"*, that sounds rather... scary? My password is easy
> because i am not afraid of direct physical access to the com
Hi,
Max Nikulin wrote:
> When vector graphics, that does not match device resolution, is rasterized,
> the result is either non-even sizes of similar elements or fuzzy lines due
> to dithering.
Nitpicking:
"Dithering" in raster graphics is emulation of color resolution at the
expense of space re
On Tue, Mar 19, 2024 at 03:33:13PM +, fxkl4...@protonmail.com wrote:
> i saw several instances of
> "This option is ignored for initramfs devices and specific to the Debian
> crypttab format. It's not supported by systemd."
> since i'm using debian and systemd are these options ignored or used
On 13/03/2024 12:25, hw wrote:
On Mon, 2024-03-11 at 23:45 +0700, Max Nikulin wrote:
It seems you expect some number that you can use for any QR code. There
is no size that fits for all codes.
It's because you said: "I believed that 300dpi is high enough
resolution for QR-codes of reasonable s
Dan Ritter wrote:
> Jan Krapivin wrote:
> > I read Debian Administrator's handbook now. And there are such
> > words:
> >
> > The root user's password should be long (12 characters or more) and
> > impossible to guess.
> ...
>
>
> > The thing is my password is very easy now, and i haven't
Greg Wooledge writes:
> On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote:
>> The root user's password should be long (12 characters or more) and
>> impossible to guess. Indeed, any computer (and a fortiori any server)
>> connected to the Internet is regularly targeted by automated con
i saw several instances of
"This option is ignored for initramfs devices and specific to the Debian
crypttab format. It's not supported by systemd."
since i'm using debian and systemd are these options ignored or used
Am Tue, 19 Mar 2024 17:42:55 +0300
schrieb Jan Krapivin :
> The thing is my password is very easy now
The simplest thin is to change that now.
, and i haven't thought about *"automated connection attempts"*,
> that sounds rather... scary?
Those attempts happen if a server software (like SSH, Te
Jan Krapivin wrote:
> I read Debian Administrator's handbook now. And there are such words:
>
> The root user's password should be long (12 characters or more) and
> impossible to guess.
...
> The thing is my password is very easy now, and i haven't thought about
> *"automated
> connection at
On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote:
> The root user's password should be long (12 characters or more) and
> impossible to guess. Indeed, any computer (and a fortiori any server)
> connected to the Internet is regularly targeted by automated connection
> attempts with the m
> The threats are different for:
>
> - a laptop that travels and can be stolen
> - a desktop that does not leave your residence
> - a server that accepts connections from the outside world
>
>
> Check whether you are running ssh:
>
It is a simple home desktop PC
*@deb:~$ /sbin/service ssh status*
> Do you have some kind of remote access enabled or do you intend to in
> the near future?
>
No and no. Its just a simple home PC.
>
> If not, then you do not need to worry. Even less if you have a firewall
> to block any service that might appear by mistake.
>
I have UFW (gufw) enabled.
Thank
I have just discovered that my Debian Bullseye server thinks that a file
has allocated 2251799813684984 blocks (!):
root@nuser:/etc/postfix# stat master.cf.bad-size
File: master.cf.bad-size
Size: 10782 Blocks: 2251799813684984 IO Block: 4096 regular
file
Device: 900h/2304d I
Jan Krapivin (12024-03-19):
> The thing is my password is very easy now, and i haven't thought about
> *"automated
> connection attempts"*, that sounds rather... scary? My password is easy
> because i am not afraid of direct physical access to the computer.
Hi.
Do you have some kind of remote acc
I read Debian Administrator's handbook now. And there are such words:
The root user's password should be long (12 characters or more) and
impossible to guess. Indeed, any computer (and a fortiori any server)
connected to the Internet is regularly targeted by automated connection
attempts with the
On 2024-03-19 13:29, debian-u...@howorth.org.uk wrote:
There's a bug in your program above, when used for PNG or JPEG. It's a
perl error and I expect you would have got an answer on perlmonks as I
suggested.
The error is described on
https://docstore.mik.ua/orelly/perl3/tk/ch17_01.htm
Look fo
"mick.crane" wrote:
> On 2024-03-19 00:42, Michael Lange wrote:
> > Hi,
> >
> > On Mon, 18 Mar 2024 19:23:39 +
> > "mick.crane" wrote:
> >
> >> I try to load images with Perl/Tk but there is message,
> >> "couldn't recognize data in image file "test.jpeg" at
> >> /usr/lib/x86_64-linux-gnu
On Tue 19/03/2024 at 12:00, mick.crane wrote:
> On 2024-03-19 00:42, Michael Lange wrote:
>> Hi,
>>
>> On Mon, 18 Mar 2024 19:23:39 +
>> "mick.crane" wrote:
>>
>>> I try to load images with Perl/Tk but there is message,
>>> "couldn't recognize data in image file "test.jpeg" at
>>> /usr/lib/
On 2024-03-19 00:42, Michael Lange wrote:
Hi,
On Mon, 18 Mar 2024 19:23:39 +
"mick.crane" wrote:
I try to load images with Perl/Tk but there is message,
"couldn't recognize data in image file "test.jpeg" at
/usr/lib/x86_64-linux-gnu/perl5/5.38/Tk/Image.pm line 21"
I've tried different ima
26 matches
Mail list logo