Page 1 of 1

hide sensitive files in encrypted containers

Posted: Thu 30 Aug 2018, 20:35
by labbe5
To follow this how-to, it is better to run a Debiandog OS.

dd is used extensively.

Source of tutorial : https://null-byte.wonderhowto.com/how-t ... m-0186691/

Posted: Fri 31 Aug 2018, 00:50
by Flash
Why do login programs permit login attempts as fast as a computer can process them? Login attempts should be limited by design to no more often than once every 5 seconds, with no que of attempts waiting. Few actual humans can try more often than that, so the limit wouldn't be noticed, and it would slow down brute force and dictionary attacks to the point that the attacker would get nervous that he was being traced and give up.

Posted: Fri 31 Aug 2018, 01:06
by 8Geee
Agreed Flash

+5

Regards
8Geee