Hi,
a refresh on this request, can DHCPD aknowledge Unbound on dhcpleases names
?
Sacha
--
Sent from: http://openbsd-archive.7691.n7.nabble.com/openbsd-user-misc-f3.html
Hey Chris,
Running the bioctl command at the bottom will also decrypt the partition.
It’s not obvious in the FAQ. It’s at the very bottom.
With my setup, I was afraid of overwriting it, but that’s how to open it.
The method you used also works!
Cheers,
Zack Lofgren
> On Jul 3, 2019, at 20:21,
PEBKAC error. I misread the instructions.
Incorrect: creating a snapshot installer usb key and booting off it.
Correct: copying bsd.rd from snapshots to my filesystem, booting off of it, and
then (U)pgrade.
:|
On Thu, Jul 04, 2019 at 02:02:39AM +, Chris Humphries wrote:
> Hello,
>
> I
Hello,
I have full disk encryption active on my machine. I would like to
follow -current, and the FAQ[1] said to grab an install image for a
snapshot and (U)pgrade.
The problem is, I'm not sure how to manually get my FDE disk live via
shell from the installer.
I tried doing disklabel on likely
ropers writes:
> ::I put on my robe and tinfoil hat.::
> ... Wow. The things you guys come up with ...
I mean yeah, I guess, in theory maybe?
Of course in order to achieve this level of evil you need highly competent
governments and corporations but that's no problem right?
Matthew
::I put on my robe and tinfoil hat.::
What keeps me awake at night is the thought of code running on things
we traditionally don't even think of as having CPUs, like on SSDs, on
the integrated device electronics of SATA disks for example.
Or on the CPU inside your CPU, like the Minix computer
Mihai,
Do you want to protest companies by not buying their equipment? That is the
only feasible outcome from this conversation.
The other outcome would be you want advice on what models will work on OpenBSD.
-Brian
> On Jul 3, 2019, at 12:11 PM, Zack Lofgren wrote:
>
> Mihai,
>
> It
Mihai,
It depends on your threat model. You can’t absolutely trust any hardware
because of low level firmware. However, that doesn’t matter if your threat
model is low enough then that doesn’t matter. Are you an enemy of the state? If
so, you probably shouldn’t trust any technology. If you’re
...
I asked for an answer more like "avoid using nVidia chipsets", not for theories.
So, again, do you consider brands when choosing hardware, like Dell
vs. Lenovo, etc. ?
Thank you.
> Try adding umsm to /sys/arch/sparc64/conf/GENERIC and build a new kernel.
> If it works ok, report back, maybe we can add it to the standard kernel.
Have added umsm to GENERIC and built a new kernel => modem works as
desired at cuaU0 -s 115200.
Next will build a multiprocessor kernel using
Any sufficiently advanced technology is indistinguishable from noise,
https://en.wikipedia.org/wiki/Shannon%E2%80%93Hartley_theorem
Thanks,
--
Raul
On Tue, Jul 2, 2019 at 1:30 PM Brian Brombacher wrote:
>
> Oh and if the implant is smart, it’ll detect you’re trying to find it and go
>
On Tue, Jul 02, 2019 at 10:43:47PM -0700, Thomas Smith wrote:
> Hi,
>
> I’m testing a script for spamd’s exec method. In order for the script to
> work, it needs the IP address from spamd.
>
> I tried passing %A to it but that doesn’t seem to work:
>
> module:\
> :black:\
>
Hi,
I’m testing a script for spamd’s exec method. In order for the script to work,
it needs the IP address from spamd.
I tried passing %A to it but that doesn’t seem to work:
module:\
:black:\
:msg="Your address %A was found in module\n\
See blah for details":\
On Tue, Jul 02, 2019 at 08:58:12AM -, Stuart Henderson wrote:
> On 2019-06-30, Jonathan Thornburg wrote:
> > I have 6.5/i386 installed on a PC Engines alix board (hostname 'sodium'),
> > acting as a home firewall and router. I'd like to install some packages
> > the firewall it to make
On Tue, Jul 02, 2019 at 05:13:43PM +, Stuart Henderson wrote:
> On 2019-07-02, Raimo Niskanen wrote:
> > Hi misc@!
> >
> > If anyone has got some tips about how to debug two hanging machines we have
> > in our test lab I am eager to learn.
> >
> > The machines runs 6.5, amd64 and are patched
15 matches
Mail list logo