Questions tagged [safety]
22 questions
7
votes
1 answer
Linux setup for intellectually impaired
This is not a request for which distro (I intend to use arch + openbox as that's the setup I'm familiar with), but rather which tools can help me accomplish the following:
I want to set up my sister's laptop so she can:
safely surf the web
watch…
Damian K. Bast
- 171
- 3
6
votes
3 answers
rm option to fail on nonexistent files
The man page of rm in GNU coreutils 8.12.197-032bb describes the -f or --force option as "ignore nonexistent files, never prompt". Without this option, it will remove any existing files, never prompt, and return a non-zero exit code if any of the…
l0b0
- 50,672
- 41
- 197
- 360
6
votes
1 answer
How to have Linux wipe/randomize/sanitize RAM at shutdown?
For mysterious reasons I still double boot sometimes into Windows.
My problem is that I fear that information may leak because the RAM memory is accessible to Windows. (the Linux partitions are encrypted and the bootmedia is not inserted,…
humanityANDpeace
- 13,722
- 13
- 61
- 107
5
votes
3 answers
When is it safe to disconnect my external HDD?
In Windows, there's an option to "safely remove hardware".
Ignoring the fact that it almost always fails, and that most of the time I simply have to plug the device out, I get the initiative behind it (not completely though).
So, when using Debian,…
jcora
- 3,874
- 7
- 34
- 52
3
votes
1 answer
Safe way to automount VeraCrypt container without showing password?
I have a Raspberry Pi 4 (4GB) running Nextcloud on it. Because all my data and backups are saved on external USB drives I will encrypt them with a VeraCrypt container. Mounting and dismounting the container with VeraCrypt is working fine.
I would…
Florian
- 31
- 1
- 2
3
votes
1 answer
How to remount /var over ssh
I have a /var directory that sometimes gets too large for the partition it's on. It would be beneficial if I could mount this directory on a larger partition.
I don't have physical access to this machine though. Only SSH and similar remote…
Drew Dormann
- 87
- 1
- 10
3
votes
0 answers
Unknown network connections in nethogs (is it safe?)
It's about a month that I see some unknown connections in nethogs and I tried to understand what program is responsible for them but I failed.
I'm not sure but it seems that my Internet connection becomes laggy or lost every time this connections…
vAB
- 31
- 3
2
votes
2 answers
installing/configuring and running sshguard on debian
I am trying to install/configure and run sshguard on debian, I want to check if brute force attacks happen on my server.
I have installed it via apt-get, then I installed systemd and followed the following instructions for configuring…
simona
- 1,001
- 3
- 13
- 27
2
votes
3 answers
Is it dangerous to remount a partition rw/ro frequently?
I'm developing an embedded linux system running on a SD card.
To protect the SD against corruption I've used a read only root filesystem as well as an extra partition where I mount /home, also in read only mode. It is in /home where the program…
fmoralesalcaide
- 23
- 3
2
votes
1 answer
Is it safe to `emerge -uavDN @world` while working?
In a related question, a few answers ("Yes", "...no problem", "typically... no problem") verify that it is safe to perform emerge -uavDN @world while working. Is it really so (for Funtoo/Gentoo)?
Nikos Alexandris
- 1,460
- 2
- 18
- 41
1
vote
0 answers
How to safely remove directory tree in script with path defined by a variable
This is a very basic question, and surely has been asked before, but I am having trouble finding the answer or guidance. There are e.g. these but they don't quite hit the mark:
How to safely remove all files (including hidden files) from current…
Ben Farmer
- 131
- 4
1
vote
1 answer
How to protect potentially destructive command line options?
I'm curious if anyone can help me with what the best way to protect potentially destructive command line options is for a linux command line application?
To give a very hypothetical scenario: imagine a command line program that sets the maximum…
ÁEDÁN
- 23
- 4
1
vote
0 answers
Guide how to configure D-Bus safely?
Recently I have tried to improve the safety/security of my system by using Linux Security Modules LSM like (apparmor, grsecurity or NSA Selinux). In my case apparmor.
Trying to limit untrusted binary BLOB "Microsoft Skype" software I run into the…
humanityANDpeace
- 13,722
- 13
- 61
- 107
0
votes
1 answer
Safety of automatically updated Gnome extensions
I was surprised to see that Gnome 3 extensions are updated automatically by Debian. Hence, I am wondering:
Which community procedures or practices make it difficult to inject harmful code in this way?
Max Flow
- 615
- 1
- 5
- 5
0
votes
1 answer
How to run software in terminal offline?
I would like to run a flatpak program offline through the terminal (flatpak spoty runs as sudo!). I am looking for a simple command like:
"runoffline" flatpak run application.
What would be the fastest/best/safest way to ensure, that programs do not…
staggy
- 1