Encrypted Root Filesystem HOWTO
|
|
|
- Dale Daniels
- 9 years ago
- Views:
Transcription
1 Encrypted Root Filesystem HOWTO Christophe Devine Revision History Revision v Revised by: cd Updated the packages version. Revision v Revised by: cd Updated the packages version. Revision v Revised by: cd Added support for GRUB. Revision v Revised by: cd Initial release, reviewed by LDP. Revision v Revised by: cd Updated and converted to DocBook XML. This document explains how to make your personal data secure by encrypting your Linux root filesystem using strong cryptography. This HOWTO is released under the GNU Free Documentation License Version 1.2.
2 Encrypted Root Filesystem HOWTO Table of Contents 1. Preparing the system Setting up the partition layout Required packages Installing Linux Installing Linux Installing util linux 2.12p Creating the encrypted root filesystem Setting up the boot device Creating the ramdisk Booting from a CD ROM Booting from a HD partition Final steps About this HOWTO...9 i
3 1. Preparing the system 1.1. Setting up the partition layout Your hard disk (hda) should contain at least three partitions: hda1: this small unencrypted partition will ask for a password in order to mount the encrypted root filesystem. hda2: this partition will contain your encrypted root filesystem; make sure it is large enough. hda3: this partition holds the current GNU/Linux system. At this point, both hda1 and hda2 are unused. hda3 is where your Linux distribution is currently installed; /usr and /boot must not be separated from this partition. Here's an example of what your partition layout might look like: # fdisk l /dev/hda Disk /dev/hda: 255 heads, 63 sectors, 2432 cylinders Units = cylinders of * 512 bytes Device Boot Start End Blocks Id System /dev/hda Linux /dev/hda Linux /dev/hda Linux /dev/hda Linux 1.2. Required packages If you use Debian, the following packages are mandatory: apt get install gcc make libncurses5 dev patch bzip2 wget To make copy & paste easier, you should also install: apt get install lynx gpm 1.3. Installing Linux There are two main projects which add loopback encryption support in the kernel: cryptoloop and loop AES. This howto is based on loop AES, since it features an extremely fast and highly optimized implementation of Rijndael in assembly language, and therefore provides maximum performance if you have an IA 32 (x86) CPU. Besides, there are some security concerns about cryptoloop. First of all, download and unpack the loop AES package: cd /usr/src wget aes.sourceforge.net/loop AES/loop AES v3.0b.tar.bz2 tar xvjf loop AES v3.0b.tar.bz2 Then you must download and patch the kernel source: 1. Preparing the system 1
4 Encrypted Root Filesystem HOWTO wget tar.bz2 tar xvjf linux tar.bz2 cd linux rm include/linux/loop.h drivers/block/loop.c patch Np1 i../loop AES v3.0b/kernel diff Setup the keyboard map: dumpkeys loadkeys m > drivers/char/defkeymap.c Next, configure your kernel; make sure the following options are set: make menuconfig Block devices > <*> Loopback device support [*] AES encrypted loop device support (NEW) <*> RAM disk support (4096) Default RAM disk size (NEW) [*] Initial RAM disk (initrd) support File systems > <*> Ext3 journalling file system support <*> Second extended fs support (important note: do not enable /dev file system support) Compile the kernel and install it: make dep bzimage make modules modules_install cp arch/i386/boot/bzimage /boot/vmlinuz If grub is your bootloader, update /boot/grub/menu.lst or /boot/grub/grub.conf: cat > /boot/grub/menu.lst << default 0 timeout 10 color green/black light green/black title Linux root (hd0,2) kernel /boot/vmlinuz ro root=/dev/hda3 Otherwise, update /etc/lilo.conf and run lilo: cat > /etc/lilo.conf << lba32 boot=/dev/hda prompt timeout=60 image=/boot/vmlinuz label=linux read only root=/dev/hda3 lilo You may now restart the system. 1. Preparing the system 2
5 1.4. Installing Linux Proceed as described in the previous section, using loop aes' kernel diff patch instead, and make sure cryptoloop support is not activated. Note that modules support require that you have the module init tools package installed Installing util linux 2.12p The losetup program, which is part of the util linux package, must be patched and recompiled in order to add strong cryptography support. Download, unpack and patch util linux: cd /usr/src wget linux/util linux 2.12p.tar.bz2 tar xvjf util linux 2.12p.tar.bz2 cd util linux 2.12p patch Np1 i../loop AES v3.0b/util linux 2.12p.diff To use passwords that are less than 20 characters, enter: CFLAGS=" O2 DLOOP_PASSWORD_MIN_LENGTH=8"; export CFLAGS Security is certainly your major concern. For this reason, please do not enable passwords shorter than 20 characters. Data privacy is not free, one has to 'pay' in form of long passwords. Compile losetup and install it as root: Encrypted Root Filesystem HOWTO./configure && make lib mount mv f /sbin/losetup /sbin/losetup~ rm f /usr/share/man/man8/losetup.8* cd mount gzip losetup.8 cp losetup /sbin cp losetup.8.gz /usr/share/man/man8/ chattr +i /sbin/losetup 1. Preparing the system 3
6 2. Creating the encrypted root filesystem Fill the target partition with random data: shred n 1 v /dev/hda2 Setup the encrypted loopback device: losetup e aes256 S xxxxxx /dev/loop0 /dev/hda2 To prevent optimized dictionary attacks, it is recommended to add the S xxxxxx option, where "xxxxxx" is your randomly chosen seed (for example, you might choose "gpk4la"). Write down your seed on a piece of paper so that you don't loose it afterwards. Also, in order to avoid boot time problems with the keyboard map, do not use non ASCII characters (accents, etc.) in your password. The Diceware site offers a simple way to create strong, yet easy to remember, passphrases. Now create the ext3 filesystem: mke2fs j /dev/loop0 Check that the password you entered is correct: losetup d /dev/loop0 losetup e aes256 S xxxxxx /dev/loop0 /dev/hda2 mkdir /mnt/efs mount /dev/loop0 /mnt/efs You can compare the encrypted and unencrypted data: xxd /dev/hda2 less xxd /dev/loop0 less It's time to install your encrypted Linux system. If you use a GNU/Linux distribution (such as Debian, Slackware, Gentoo, Mandrake, RedHat/Fedora, SuSE, etc.), run the following command: cp avx / /mnt/efs If you use the Linux From Scratch book, proceed as described in the manual, with the modifications below: Chapter 6 Installing util linux: Apply the loop AES patch after unpacking the sources. Chapter 8 Making the LFS system bootable: Refer to the next section (Setting up the boot device). 2. Creating the encrypted root filesystem 4
7 3. Setting up the boot device 3.1. Creating the ramdisk To begin with, chroot inside the encrypted partition and create the boot device mount point: chroot /mnt/efs mkdir /loader Then, create the initial ramdisk (initrd), which will be needed afterwards: cd dd if=/dev/zero of=initrd bs=1k count=4096 mke2fs F initrd mkdir ramdisk mount o loop initrd ramdisk If you're using grsecurity, you may get a "Permission denied" error message; in this case you'll have to run the mount command outside chroot. Create the filesystem hierarchy and copy the required files in it: mkdir ramdisk/{bin,dev,lib,mnt,sbin} cp /bin/{bash,mount} ramdisk/bin/ ln s bash ramdisk/bin/sh mknod m 600 ramdisk/dev/console c 5 1 mknod m 600 ramdisk/dev/hda2 b 3 2 mknod m 600 ramdisk/dev/loop0 b 7 0 cp /lib/{ld linux.so.2,libc.so.6,libdl.so.2} ramdisk/lib/ cp /lib/{libncurses.so.5,libtermcap.so.2} ramdisk/lib/ cp /sbin/{losetup,pivot_root} ramdisk/sbin/ It's ok if you see a message like "/lib/libncurses.so.5: No such file or directory", or "/lib/libtermcap.so.2: No such file or directory"; bash only requires one of these two libraries. You can check which one is actually required with: ldd /bin/bash Compile the sleep program, which will prevent the password prompt being flooded by kernel messages (such as usb devices being registered). cat > sleep.c << "" #include <unistd.h> #include <stdlib.h> int main( int argc, char *argv[] ) { if( argc == 2 ) sleep( atoi( argv[1] ) ); } return( 0 ); gcc s sleep.c o ramdisk/bin/sleep rm sleep.c Create the init script: 3. Setting up the boot device 5
8 cat > ramdisk/sbin/init << "" #!/bin/sh /bin/sleep 3 echo n "Enter seed value: " read SEED /sbin/losetup e aes256 S $SEED /dev/loop0 /dev/hda2 /bin/mount r n t ext3 /dev/loop0 /mnt while [ $? ne 0 ] do /sbin/losetup d /dev/loop0 /sbin/losetup e aes256 S $SEED /dev/loop0 /dev/hda2 /bin/mount r n t ext3 /dev/loop0 /mnt done cd /mnt /sbin/pivot_root. loader exec /usr/sbin/chroot. /sbin/init chmod 755 ramdisk/sbin/init Umount the loopback device and compress the initrd: Encrypted Root Filesystem HOWTO umount d ramdisk rmdir ramdisk gzip initrd mv initrd.gz /boot/ 3.2. Booting from a CD ROM I strongly advise you to start your system with a read only media, such as a bootable CD ROM. Download and unpack syslinux: wget tar.bz2 tar xvjf syslinux 3.07.tar.bz2 Configure isolinux: mkdir bootcd cp /boot/{vmlinuz,initrd.gz} syslinux 3.07/isolinux.bin bootcd echo "DEFAULT /vmlinuz initrd=initrd.gz ro root=/dev/ram0" \ > bootcd/isolinux.cfg Create and burn the bootable cd rom iso image: mkisofs o bootcd.iso b isolinux.bin c boot.cat \ no emul boot boot load size 4 boot info table \ J hide rr moved R bootcd/ cdrecord dev 0,0,0 speed 4 v bootcd.iso rm rf bootcd{,.iso} 3. Setting up the boot device 6
9 3.3. Booting from a HD partition The boot partition can come in handy if you happen to lose your bootable CD. Remember that hda1 is a writable media and is thus insecure; use it only in case of emergency! Create and mount the ext2 filesystem: dd if=/dev/zero of=/dev/hda1 bs=8192 mke2fs /dev/hda1 mount /dev/hda1 /loader Copy the kernel and the initial ramdisk: cp /boot/{vmlinuz,initrd.gz} /loader If you use grub: Encrypted Root Filesystem HOWTO mkdir /loader/boot cp av /boot/grub /loader/boot/ cat > /loader/boot/grub/menu.lst << default 0 timeout 10 color green/black light green/black title Linux root (hd0,0) kernel /vmlinuz ro root=/dev/ram0 initrd /initrd.gz grub install root directory=/loader /dev/hda umount /loader If you use lilo: mkdir /loader/{boot,dev,etc} cp /boot/boot.b /loader/boot/ mknod m 600 /loader/dev/hda b 3 0 mknod m 600 /loader/dev/hda1 b 3 1 mknod m 600 /loader/dev/hda2 b 3 2 mknod m 600 /loader/dev/hda3 b 3 3 mknod m 600 /loader/dev/hda4 b 3 4 mknod m 600 /loader/dev/ram0 b 1 0 cat > /loader/etc/lilo.conf << lba32 boot=/dev/hda prompt timeout=60 image=/vmlinuz label=linux initrd=/initrd.gz read only root=/dev/ram0 lilo r /loader umount /loader 3. Setting up the boot device 7
10 4. Final steps Still inside chroot, modify /etc/fstab so that it contains: /dev/loop0 / ext3 defaults 0 1 Delete /etc/mtab and exit from chroot. Finally, run "umount d /mnt/efs" and reboot. If something goes wrong, you can still boot your unencrypted partition by entering "Linux root=/dev/hda3" at the LILO: prompt. If everything went well, you can now re partition your disk and encrypt hda3 as well as hda4. In the following scripts, we assume that hda3 will hold the swap device and hda4 will contain /home; you should initialize both partitions first: shred n 1 v /dev/hda3 shred n 1 v /dev/hda4 losetup e aes256 S xxxxxx /dev/loop1 /dev/hda3 losetup e aes256 S xxxxxx /dev/loop2 /dev/hda4 mkswap /dev/loop1 mke2fs j /dev/loop2 Then create a script in the system startup directory and update fstab: cat > /etc/init.d/loop << "" #!/bin/sh if [ "`/usr/bin/md5sum /dev/hda1`"!= \ "5671cebdb3bed87c3b3c345f0101d016 /dev/hda1" ] then echo n "WARNING! hda1 integrity verification FAILED press enter." read fi echo "1st password chosen above" \ /sbin/losetup p 0 e aes256 S xxxxxx /dev/loop1 /dev/hda3 echo "2nd password chosen above" \ /sbin/losetup p 0 e aes256 S xxxxxx /dev/loop2 /dev/hda4 /sbin/swapon /dev/loop1 for i in `seq 0 63` do echo n e "\33[10;10]\33[11;10]" > /dev/tty$i done chmod 700 /etc/init.d/loop ln s../init.d/loop /etc/rcs.d/s00loop vi /etc/fstab... /dev/loop2 /home ext3 defaults Final steps 8
11 5. About this HOWTO The Encrypted Root Filesystem HOWTO was first written in november 2002 for the Linux From Scratch project. I'd like to thank the many people who have since contributed to this document (in reverse chronological order): Micha Borrmann, Dennis Lemckert, Oleg Vyushin, Ellen Bokhorst, Daczi László, Gaetano Zappulla, Guillaume Lehmann, Claude Thomassin, Jean Philippe Guérard, Luc Vo Van, Jacobus Brink, Ernesto Pérez Estévez, Matthew Ploessel, Mike Lorek, Lars Bungum, Michael Shields, Julien Perrot, Grant Stephenson, Cary W. Gilmer, James Howells, Pedro Baez, Josh Purinton, Jari Ruusu and Zibeli Aton. This HOWTO has been translated in various languages: French Italian Hungarian Dutch Please send any comment to Christophe Devine. 5. About this HOWTO 9
Using Encrypted File Systems with Caché 5.0
Using Encrypted File Systems with Caché 5.0 Version 5.0.17 30 June 2005 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Using Encrypted File Systems with Caché 5.0 InterSystems
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
ATT8231: Creating a Customized USB Thumb Drive for ZCM Imaging Methods for creating a customized bootable USB Thumb Drive
ATT8231: Creating a Customized USB Thumb Drive for ZCM Imaging Methods for creating a customized bootable USB Thumb Drive Rich Hanley Senior ATT Engineer [email protected] Objectives Understanding ZCM
Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption
Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption This is a step-by-step guide showing how to create an encrypted bootable Backtrack 4 USB thumb drive. I put quotes around full in the title
Open Source Encrypted Filesystems for Free Unix Systems
Open Source Encrypted Filesystems for Free Unix Systems George Kargiotakis [email protected] Introduction Users seek ways to secure their data with maximum comfort and minimum requirements. No application
Linux Boot Loaders Compared
Linux Boot Loaders Compared L.C. Benschop May 29, 2003 Copyright c 2002, 2003, L.C. Benschop, Eindhoven, The Netherlands. Permission is granted to make verbatim copies of this document. This is version
The Linux CryptoAPI A User s Perspective
The Linux CryptoAPI A User s Perspective David Bryson May 31, 2002 Abstract Today we are going to talk about using strong cryptography inside Linux. With currently available kernel patches discussed in
Creating a Cray System Management Workstation (SMW) Bootable Backup Drive
Creating a Cray System Management Workstation (SMW) Bootable Backup Drive This technical note provides the procedures to create a System Management Workstation (SMW) bootable backup drive. The purpose
Buildroot for Vortex86EX (2016/04/20)
Buildroot for Vortex86EX (2016/04/20) Table of Contents Introduction...1 Prepare...1 Install Virtual Machine (optional)...1 Install Buildroot...3 Config Buildroot for VEX-SOM (optional)...4 Generate Linux
Getting your system to boot with initrd and initramfs
Getting your system to boot with initrd and initramfs Ryan Curtin LUG@GT Ryan Curtin Getting your system to boot with initrd and initramfs - p. 1/12 Goals By the end of this presentation, hopefully, you
Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system.
Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) All commands run from terminal as super user. Default CentOS 6.3 installation with two hard drives, /dev/sda
Installing Debian with SATA based RAID
Installing Debian with SATA based RAID Now for 2.6 kernel version I've read that there will soon be an installer that will do raid installs and perhaps even support SATA, but today it is manual. My install
LiveCD Howto (CentOS 4) - Step by step - 01/12/2006 - Ver 1.1
LiveCD Howto (CentOS 4) - Step by step - 01/12/2006 - Ver 1.1 (This howto is for CentOS 4.4 i386. The version numbers may be different) Overview This howto illustrate the way to "compile" your own LiveCD
RAID Software Suite for Linux
RAID Software Suite for Linux Installation Guide Rev 1.001 June 2000 Order Number: 273377-001 Information in this document is provided in connection with Intel products. No license, express or implied,
HTTP-FUSE PS3 Linux: an internet boot framework with kboot
HTTP-FUSE PS3 Linux: an internet boot framework with kboot http://openlab.jp/oscirclar/ Kuniyasu Suzaki and Toshiki Yagi National Institute of Advanced Industrial Science and Technology Embedded Linux
Linux + Windows 95 mini HOWTO
Linux + Windows 95 mini HOWTO Jonathon Katz [email protected] Joy Yokley Converted document from HTML to DocBook 4.1 (SGML) 2001 03 01 Revision History Revision 1.1.1 2001 04 19 Revised by: DCM Corrected
Planning for an Amanda Disaster Recovery System
Planning for an Amanda Disaster Recovery System Bernd Harmsen [email protected] www.datasysteme.de 22nd April 2003 Contents 1 Introduction 1 1.1 Why we need a specialized Amanda Disaster Recovery System?..............
Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD
Cryptographic Filesystems Background and Implementations for Linux and OpenBSD Background Loop device primer Keys, cipher modes, salting, key hashing Journaling file systems and encrypted swap Offset,
TECHNICAL HOWTO. Imaging Linux systems with hardware changes. author: [email protected]
TECHNICAL HOWTO Imaging Linux systems with hardware changes using Mondo Rescue Last modified: author: [email protected] ABSTRACT This document describes the process to create and deploy system
Load Balancing - Single Multipath Route HOWTO
Load Balancing - Single Multipath Route HOWTO Shakthi Kannan, shaks_wants_no_spam_at_shakthimaan_dot_com January 5, 2007 Revision: 1.2 Abstract This documentation provides the steps to setup load-balancing
Linux Template Creation Guide. How to build your own Linux VM templates for deployment in Cloudturk.
Linux Template Creation Guide How to build your own Linux VM templates for deployment in Cloudturk. TABLE OF CONTENTS 1. Installing Xen Hypervisor... 2 2. Installing DomU (Paravirtualized)... 5 3. Installing
Btrfs and Rollback How It Works and How to Avoid Pitfalls
Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server [email protected] rm -rf /? I will be discussing what is needed for rollback: Btrfs /
Linux Embedded devices with PicoDebian Martin Noha 28.9.2006
Embedded systems Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 24.03.2005 1 Agenda Why did I look in this stuff? What is an embedded device? Characteristic hardware global requirements for
Redhat 6.2 Installation Howto -Basic Proxy and Transparent
Redhat 6.2 Installation Howto -Basic Proxy and Transparent This is a guide document although very detailed in some sections. It assumes you have a have an idea about installing RH and working with Linux.
WES 9.2 DRIVE CONFIGURATION WORKSHEET
WES 9.2 DRIVE CONFIGURATION WORKSHEET This packet will provide you with a paper medium external to your WES box to write down the device names, partitions, and mount points within your machine. You may
BackTrack Hard Drive Installation
BackTrack Hard Drive Installation BackTrack Development Team jabra [at] remote-exploit [dot] org Installing Backtrack to a USB Stick or Hard Drive 1 Table of Contents BackTrack Hard Drive Installation...3
Computer forensic science
Computer forensic science This drive has been victimized! Mallory 1 CS78 students must help! CS78 students What happened?! Every student gets a copy 2 Forensic science it s detective work Computer forensic
Linux Disaster Recovery best practices with rear
Relax and Recover Linux Disaster Recovery best practices with rear Gratien D'haese IT3 Consultants Who am I Independent Unix System Engineer since 1996 Unix user since 1986 Linux user since 1991 Open Source
Customizing Boot Media for Linux* Direct Boot
White Paper Bruce Liao Platform Application Engineer Intel Corporation Customizing Boot Media for Linux* Direct Boot October 2013 329747-001 Executive Summary This white paper introduces the traditional
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Encryption Security Recommendations
Basic Concepts Sensitive data should be encrypted while in transit and stored. All communication between clients and servers, and between servers (Web server to app server, app server to database server,
Installing Ubuntu 12.04.1 LTS with full disk encryption
Installing Ubuntu 12.04.1 LTS with full disk encryption Intro: This is a simple step by step tutorial showing you how to install Ubuntu 12.04.1 LTS with enabled full disk encryption. If you don't know
BATTENING DOWN THE DISKS
COVER STORY CD Encryption Burning CDs and DVDS with an encrypted filesystem BATTENING DOWN THE DISKS petris, Fotolia An encrypted hard disk on your server is no help if valuable data on CDs or DVDs falls
System administration basics
Embedded Linux Training System administration basics Michael Opdenacker Thomas Petazzoni Free Electrons Copyright 2009, Free Electrons. Creative Commons BY SA 3.0 license Latest update: Dec 20, 2010, Document
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data
Booting Linux from a USB Flash Device on MPC5200 Systems David Wolfe, Infotainment, Multimedia and Telematics Division
Freescale Semiconductor Application Note AN3217 Rev. 0, 1/2006 Booting Linux from a USB Flash Device on MPC5200 Systems by David Wolfe, Infotainment, Multimedia and Telematics Division This document demonstrates
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
NI Real-Time Hypervisor for Windows
QUICK START GUIDE NI Real-Time Hypervisor Version 2.1 The NI Real-Time Hypervisor provides a platform you can use to develop and run LabVIEW and LabVIEW Real-Time applications simultaneously on a single
A candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
Relax and Recover (rear) Workshop
Relax and Recover Relax and Recover (rear) Workshop Gratien D'haese IT3 Consultants Getting started with rear Download it from The official tar-balls https://github.com/rear/rear/downloads/ The rear-snapshot
Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery
Linux Overview Written by: Josh Lowery The Senator Patrick Leahy Center for Digital Investigation Champlain College October 29, 2012 Disclaimer: This document contains information based on research that
Red Hat Linux 7.2 Installation Guide
Red Hat Linux 7.2 Installation Guide Ryan Spangler [email protected] http://ceut.uww.edu April 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002
Recovering Data from Windows Systems by Using Linux
Recovering Data from Windows Systems by Using Linux Published by the Open Source Software at Microsoft, May 27 Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab Most
Yosemite Server Backup Installation Guide
Yosemite Server Backup Installation Guide Part number: First edition: October, 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this
An Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
Puppy Linux Installation To a USB Flash Drive How to install Puppy Linux lupu 5.2.8 Lucid to a Flash Drive
Puppy Linux Installation To a USB Flash Drive How to install Puppy Linux lupu 5.2.8 Lucid to a Flash Drive Puppy Linux Lucid installation tutorial to a vfat format flash drive with a useful application
How to Install Windows on Xen TM 3.0
How to Install Windows on Xen TM 3.0 A XenSource Technical Note for the Windows 2003 Server Introduction This note describes how to install Windows 2003 Server on Xen. It provides an overview of the Linux
Backup of ESXi Virtual Machines using Affa
Backup of ESXi Virtual Machines using Affa From SME Server Skill level: Advanced The instructions on this page may require deviations from procedure, a good understanding of linux and SME is recommended.
Building a diskless Linux Cluster for high performance computations from a standard Linux distribution
Building a diskless Linux Cluster for high performance computations from a standard Linux distribution Stefan Böhringer Institut für Humangenetik Universitätsklinikum Essen April, 7 th, 2003 Abstract This
Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family
Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family *5991-5301* Part number: 5991-5301 Edition: 3, E0406 Copyright 2006 Hewlett-Packard Development
How To Manage Your Volume On Linux 2.5.5 (Evms) 2.4.5 On A Windows Box (Amd64) On A Raspberry Powerbook (Amd32) On An Ubuntu Box (Aes) On Linux
www.suse.com/documentation Storage Administration Guide SUSE Linux Enterprise Server 10 SP3/SP4 March 6, 2011 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
SETTING UP RASPBERRY PI FOR TOPPY FTP ACCESS. (Draft 5)
SETTING UP RASPBERRY PI FOR TOPPY FTP ACCESS (Draft 5) 1 INTRODUCTION These notes describe how I set up my Raspberry Pi to allow FTP connection to a Toppy. Text in blue indicates Linux commands or file
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
Recovering Data from Windows Systems by Using Linux
Recovering Data from Windows Systems by Using Linux Published by the Open Source Software Lab at Microsoft. November 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software
2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel
These are the steps to build a hylafax server. 1. Build up your server hardware, preferably with RAID 5 (3 drives) plus 1 hotspare. Use a 3ware raid card, 8000 series is a good choice. Use an external
Abstract. Microsoft Corporation Published: August 2009
Linux Integration Components Version 2 for Hyper-V (Windows Server 2008, Windows Server 2008 R2, Microsoft Hyper-V Server 2008, and Microsoft Hyper-V Server 2008 R2) Readme Microsoft Corporation Published:
Windows Template Creation Guide. How to build your own Windows VM templates for deployment in Cloudturk.
Windows Template Creation Guide How to build your own Windows VM templates for deployment in Cloudturk. TABLE OF CONTENTS 1. Preparing the Server... 2 2. Installing Windows... 3 3. Creating a Template...
How To Set Up Software Raid In Linux 6.2.2 (Amd64)
Software RAID on Red Hat Enterprise Linux v6 Installation, Migration and Recovery November 2010 Ashokan Vellimalai Raghavendra Biligiri Dell Enterprise Operating Systems THIS WHITE PAPER IS FOR INFORMATIONAL
II. Installing Debian Linux:
Debian Linux Installation Lab Spring 2013 In this lab you will be installing Debian Linux in a KVM (Kernel Virtual Machine). You will be guided through a series of steps to setup the network (IP addresses,
Installation GENTOO + RAID sur VMWARE
Installation GENTOO + RAID sur VMWARE Chargement modules modprobe raid0 modprobe raid1 modprobe dm-mod Partitionnement /dev/sdx1 ext2 32M /dev/sdx2 swap =RAM /dev/sdx3 ext3 reste du disque Pour supprimer
Linux Distributed Security Module 1
Linux Distributed Security Module 1 By Miroslaw Zakrzewski and Ibrahim Haddad This article describes the implementation of Mandatory Access Control through a Linux kernel module that is targeted for Linux
How to Restore a Linux Server Using Bare Metal Restore
How to Restore a Linux Server Using Bare Metal Restore This article refers to firmware version 5.4 and higher, and the Barracuda Linux Backup Agent 5.4 and higher. Use the steps in this article to restore
Root-on-LVM-on-RAID HOWTO
Massimiliano Ferrero [email protected] This document describes a procedure to install a Linux system with software RAID and Logical Volume Manager (LVM) support and with a root file system stored into
Installing Multiple Linux Distributions on a Single Machine
Hentzenwerke Whitepaper Series Installing Multiple Linux Distributions on a Single Machine By Whil Hentzen There are lots of places that tell you the general ideas on setting up a multiple boot, usually
www.cristie.com CBMR for Linux v6.2.2 User Guide
www.cristie.com CBMR for Linux v6.2.2 User Guide Contents CBMR for Linux User Guide - Version: 6.2.2 Section No. Section Title Page 1.0 Using this Guide 3 1.1 Version 3 1.2 Limitations 3 2.0 About CBMR
Make a Bootable USB Flash Drive from the Restored Edition of Hiren s Boot CD
Make a Bootable USB Flash Drive from the Restored Edition of Hiren s Boot CD [email protected] Contents 1 Linux Method 2 2 Windows Method 3 3 Alternative Windows Method (RMPrepUSB) 4 4 HBCD on
Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Update 5 Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
Getting Started with the Linux Intrusion Detection
1 of 7 6/18/2006 9:07 PM Getting Started with the Linux Intrusion Detection System Irfan Habib Abstract Sometimes file permissions aren't enough. LIDS gives you kernel-level access control that goes beyond
Building Elastix-2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC)
Building Elastix2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC) This information has been modified and updated by Nick Ross. Please refer to the original document found at:
Procedure to Create and Duplicate Master LiveUSB Stick
Procedure to Create and Duplicate Master LiveUSB Stick A. Creating a Master LiveUSB stick using 64 GB USB Flash Drive 1. Formatting USB stick having Linux partition (skip this step if you are using a new
On Disk Encryption with Red Hat Enterprise Linux
On Disk Encryption with Red Hat Enterprise Linux Author: Contact: Copyright: URL: Bowe Strickland, Curriculum Manager [email protected] Copyright 2011, Red Hat, Inc. All rights reserved. http://people.redhat.com/~bowe/summit/2011/tot/on_disk_encryption
w1r3 Network Documentation
w1r3 Network Documentation Release 1.0 w1r3 Network June 08, 2014 Contents 1 Infrastructure 3 1.1 Team orientation............................................. 3 1.2 Accounts.................................................
Acronis Backup & Recovery 10 Server for Linux. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for
Getting started with ARM-Linux
Getting started with ARM-Linux www.embeddedarm.com (480)-837-5200 usa Connecting serial communications and power (JP2 must be installed to enable console) An ANSI terminal or a PC running a terminal emulator
Procedure to convert Intel Dot.Station 2300 into a LINUX Red Hat 8.0 box. Document Version: 1.1 Author: Javier Castilla (latas) Release: 1
Procedure to convert Intel Dot.Station 2300 into a LINUX Red Hat 8.0 box. Document Version: 1.1 Author: Javier Castilla (latas) Release: 1 INDICE 1. Antes de Empezar... 3 1.1. Por qué Red Hat 8.0?... 3
Best Practices in Hardening Apache Services under Linux
Best Practices in Hardening Apache Services under Linux Anthony Kent Web servers are attacked more frequently than anything else on the internet. Without the proper security measures it is just a matter
Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF
Survey of Filesystems for Embedded Linux Presented by Gene Sally CELF Presentation Filesystems In Summary What is a filesystem Kernel and User space filesystems Picking a root filesystem Filesystem Round-up
Linux Disaster Recovery best practices with rear
Relax and Recover Linux Disaster Recovery best practices with rear Gratien D'haese IT3 Consultants Who am I Independent Unix System Engineer since 1996 Unix user since 1986 Linux user since 1991 Open Source
Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide
Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide Contents Installation: Ubuntu Linux 7.10 Gusty Gibbon:... 2 Installation: Redhat Enterprise 5 and Fedora 8 Linux:...
Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02
Cristie Bare Machine Recovery Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02 This documentation shows how to restore or migrate a Linux system on dissimilar
Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK
Quick Start Guide Copyright Statement Copyright Lone Star Software Corp. 1983-2013 ALL RIGHTS RESERVED. All content viewable or accessible from this guide is the sole property of Lone Star Software Corp.
ULTEO OPEN VIRTUAL DESKTOP V4.0
ULTEO OPEN VIRTUAL DESKTOP V4.0 MIGRATION GUIDE 28 February 2014 Contents Section 1 Introduction... 4 Section 2 Overview... 5 Section 3 Preparation... 6 3.1 Enter Maintenance Mode... 6 3.2 Backup The OVD
RapidSeed for Replicating Systems Version 7.4
RapidSeed for Replicating Systems Version 7.4 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Overview...3 Supported seed devices by system...4 Prerequisites...4 General
Linux System Recovery Guide. Version 7.1
TM Linux System Recovery Guide Version 7.1 Trademarks and Copyrights Copyright SBAdmin, Inc. 1999-2009 SBAdmin is a registered trademark of SBAdmin, Inc. SBAdmin is a trademark of Storix, Inc in the USA
Xen Zynq Distribution
Xen Zynq Distribution User s Manual - BETA Revision History The following table shows the revision history for this document. Date DD/MM/YYYY Version Changes 30/03/2015 0.1 Converted Alpha Release Document
Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux
Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux NOTE: If you need more information regarding the installation process for other distributions
How to Install and Run Tibia on Linux Using Wine without Windows Contents
How to Install and Run Tibia on Linux Using Wine without Windows Contents 1 Disclaimer 2 Overview/Background Information 3 Pre-requirements 4 Installing Wine 4.1 Get to know the environment 4.2 The easiest
AdvLinux for i486sx User Manual V1.02
AdvLinux for i486sx User Manual V1.02 Contents 1. ABOUT THIS MANUAL...1 2. ADVLINUX FOR I486SX OVERVIEW...1 2.1. SUPPORT DEVICES...1 2.2. MAIN FEATURES...1 3. INSTALL ADVANTECH EMBEDDED LINUX FOR I486SX...3
INF-110. GPFS Installation
INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity
RecoverEDGE. Microlite. Smart Crash Recovery Software. Technical Reference Supplement to the. Microlite
Microlite Smart Crash Recovery Software Technical Reference Supplement to the Microlite BackupEDGE 2.3 User Guide for systems running BackupEDGE on UnixWare 7.1.x Linux 2.4.x/2.6.x (IA32 / EM64T / AMD64
RocketRAID 2640/2642 SAS Controller Ubuntu Linux Installation Guide
RocketRAID 2640/2642 SAS Controller Ubuntu Linux Installation Guide Version 1.2 Copyright 2012 HighPoint Technologies, Inc. All rights reserved. Last updated on June 14, 2012 Table of Contents 1 Overview...
Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines. An Oracle Technical White Paper December 2008
Converting Linux and Windows Physical and Virtual Machines to Oracle VM Virtual Machines An Oracle Technical White Paper December 2008 Converting Linux and Windows Physical and Virtual Machines to Oracle
Booting and Configuring a Xen Host
Booting and Configuring a Xen Host Now the fun actually begins! The previous chapters provided background information on virtualization in general and Xen in particular, and discussed how to obtain and
Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015)
Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Access CloudStack web interface via: Internal access links: http://cloudstack.doc.ic.ac.uk
