To follow this how-to, it is better to run a Debiandog OS.
dd is used extensively.
Source of tutorial : https://null-byte.wonderhowto.com/how-t ... m-0186691/
hide sensitive files in encrypted containers
Why do login programs permit login attempts as fast as a computer can process them? Login attempts should be limited by design to no more often than once every 5 seconds, with no que of attempts waiting. Few actual humans can try more often than that, so the limit wouldn't be noticed, and it would slow down brute force and dictionary attacks to the point that the attacker would get nervous that he was being traced and give up.