The next distro tried was Zorin (Ubuntu-based). Seems it will not allow the use of CryptKeeper, which (or something like it) is required for the particular application.
Next attempt will be with Linux Mint (also Ubuntu based).
The next distro tried was Zorin (Ubuntu-based). Seems it will not allow the use of CryptKeeper, which (or something like it) is required for the particular application.
Next attempt will be with Linux Mint (also Ubuntu based).
Upon further experimentation, Tails is apparently out for the security solution. It does not seem to be able to save subsequently installed applications to the persistent file. Saves network configuration, as well as some other settings, but just no applications. That is not adequate for my client’s purposes.
Now investigating Zorin boot thumb drive option.
I have noted a peculiarity about this particular WordPress site, a phenomenon that does not occur with the other dozen or so WordPress sites I maintain: I keep getting notices about new subscribers, despite the fact that I make no effort whatsoever to publicize this site (it’s basically just a gratuitous repository for little more than a diary), but the subscriber user names bear no resemblance to the associated subscriber email addresses, such as the latest user name, ValerieMoor00, with the email address of terrianne.borawski_2303701@yahoo.com.
So what’s your name, bitch, Valerie or Terrianne?
So far, all of them, to a one, have been yahoo email addresses, which, in itself, is an immediate and HUGE red flag. But also, not a one of them has exhibited any resemblance between the user name and the email address — most of the user names have been quite clearly contrived to deceive.
Just a point of note to those pursuing this misguided activity, such subscriber accounts will be, without notice, summarily deleted. You can just fuck off!
Furthermore, I intend to invoke demons to aid me in visiting mischief and calamities on your computer. Be prepared to have your computer cursed.
And just now, another one: ConsueloMaye240 — maribeth.snell_283463@yahoo.com
And more:
Username: GilbertoZ79, Email: brena.link_469205@yahoo.com
Had a bit of an intense day, today, attempting to research and propose some specific Linux distribution with emphasis on security and encryption. Found some articles simply searching on the phrase “most secure version of linux”. One had only 3 recommendations: Tails (The Amnesic Incognito Live System), LPS (Lightweight Portable Security), and Surprise!
Another article had so many recommendations, mostly directed at those intending to use it to penetrate security measures, that I found it unuseful.
Settled on Tails, based on Debian, which, though its user interface is a bit clunky (may be an issue for the intended client), appears to have the necessary applications to provide encryption, as well as standard applications (Libre Office). An added cute attribute is that it provides an optional UI that appears to be Windows 8.
The idea, for the client in question, is to have a bootable USB 3.0 thumb-drive, containing the operating system (obviously), as well as all the necessary applications for his purposes, but have a separate encrypted thumb-drive (need not be USB 3.0, as it will be data only), just for his files. At the end of the day, both are removed from the computer on which they are used, and, as a function of its operation, Tails wipes the computer’s memory before shutting down, leaving no trace of anything that was performed on that computer.
This solution provides the desired security for any given session, as well as completely eliminating the insecure aspect of a physical storage device on a system that may be, from time to time, unattended and subject to direct physical OR remote intrusion.
Ran out of time, and so was not able to complete my tests, today, and still waiting to see how well the persistent files function works, allowing new application installations and updates to be saved to the bootable thumb-drive.
Got an introduction, through many searches, and much banging of head against the wall, to the use of “combinators” in CSS. A combinator is something that explains the relationship between the selectors.
The four types are:
I can see I’ve got some work to do on the CSS for this WordPress theme, too — the text in the bulleted items, above, is a larger font-size than the rest of the post. I also do not care for the way the bullets are outdented.
Was poring over the vast selection of Google fonts, today, and got to thinking about how best to display my best picks for Edge Of Null use. Wondering if I could set up HTML pages with PNG images overlayed by divs containing text entirely controlled by CSS, and with a combination of Javascript and PHP, have buttons that substituted a different stylesheet, displaying the alternate choices.
Will have to do some serious PHP review, and reasonably serious Javascript/jQuery review, methinks.
Have been trying to figure out why this theme, Twenty Fifteen, has no control over what it calls the “theme default” font. Because of that, font in the sidebar, under Recent Posts, does not appear to be changeable in the customization options.
For those wondering why it’s so bloody difficult to boot from a thumb drive with Windows 8 or Windows 10.
One reason: Microsoft is trying to protect you from yourself.
That said, a caveat is in order. The following procedures are documented from testing with an ASUS Model X200M (laptop) running Windows 8.1. Your BIOS screen may differ as may the keys required to access the BIOS and the boot menu.
Since the procedures involve restarting the computer and pressing keys to intercept the automagic boot from the hard drive, it is best to prepare by inserting your bootable thumb drive in an available USB port ahead of time, rather than scrambling to plug it in during the boot process.
The following procedure is conditional, based on the current settings for the two specified options. Once these changes are made in the bios, they will be retained until such time as they are again changed, whether deliberately, by accident, or through failure of the battery supplying charge to the CMOS. If you have already made these changes, move to the next section, “Every Time”.
The second part is performed each time booting from USB drive.
Presuming that you have performed the one-time procedure above, and Launch CSM has already been set to Enabled, and Secure Boot has already been set to Disabled, and that your bootable USB flash drive is already inserted in an available USB port, on power up or restart, press and hold the Esc key to access the Boot menu.
NOTE: Sometimes, on a restart, particularly from the BIOS settings, the computer will ignore the pressed Esc key and boot into Windows anyway, in which case, release the Esc key, choose shut-down, restart, and try it again, pressing the Esc key as soon as the blue “Restarting” screen appears and hold it down until the boot menu appears.
When presented with the Boot menu (“Please select boot device:”), you will typically see two entries indicating your USB bootable drive, one prefaced with “UEFI:”. Choose the other one, and press the Enter key.
And Bob’s your uncle.
Kinda liking this blog post thing; it appeals to a literary longing. I perused my posts here, and was particularly amused at the first, where I bemoaned having lost all my data.
I have a folder, probably on one of the older computers in here (only four of them, at the moment — three with dual-monitor display configurations — but also one in the next room and two upstairs, not counting the two smart-phones and two tablets) that contains a journal from some time ago. Stopped entries at some point; lost interest, I guess. Feels like it might be time to pursue that a bit. May take a while to find the computer with that folder.
However, since I have no idea the extent to which this blog will remain private, there are certain things I will not express here, they being of a private nature and appropriate more for a posthumously released autobiography — after I’m dead, I really won’t care.
But that’s enough, for now.
Had this one on my todo list for a long time. Had not figured out the proper settings for iPhone and iPad to be able to have outgoing mail appear at the recipient’s end with the same domain as that on which it was ostensibly sent. It was a port and SSL issue that, lacking a resolution, necessitated using a Gmail outgoing mail server.
All settings are figured automagically and unchangeable by the user.