domingo, julho 16, 2017

How to Perform Full-Disk Encryption in Windows 10

How to Perform Full-Disk Encryption in Windows 10 - Make Tech Easier





Full-disk encryption in Windows 10 protects your data from prying eyes. It’s easy to implement and invaluable for just about any user, especially those that travel with important data.



Full-disk encryption means that without your user password, the data on your hard drive is completely inaccessible. If a disk is not encrypted, it’s possible to remove the disk from your computer, mount it to the attacker’s computer, and access all your files with no restrictions. Encrypted disks don’t suffer from this security hole. Because their data is hopelessly scrambled without the key, it’s totally unintelligible to a key-less attacker.
Yes, especially so if you have a laptop or have files you want to keep secure. Desktop computers are less of a security risk since they don’t travel. However, the downsides of full-disk encryption are so few that there isn’t much reason not to. Modern computers are fast enough to handle the computational overhead of encryption without even pausing. The major downside is that if you forget your password and lose your recovery key, your files are toast. It might also limit your ability to use third-party backup solutions, but we haven’t been able to test that ourselves.
BitLocker is Microsoft’s proprietary disk encryption software for Windows 10. Because it’s designed by a large, for-profit company, and because the U.S. government approached Microsoft about adding a “back door” to its encryption scheme, BitLocker hasn’t enjoyed the greatest reputation. However, well-respected security researcher Bruce Schneier still recommends it, and it’s perfectly adequate for average Windows users. If using software produced by a giant corporation with ambiguous intent and potential backroom dealings with the U.S. government, that’s reasonable. VeraCrypt is a good, open-source option.
1. Locate the hard drive you want to encrypt under “This PC” in Windows Explorer. We’ll be encrypting my boot disk for this tutorial.
bitlocker-locate-boot-drive
2. Right-click the target drive and choose “Turn on BitLocker.”
bitlocker-choose-target-drive
3. If you see an error message about needing a “Trusted Platform Module” or TPM, you’ll need to add a Group Policy Exception to allow BitLocker to run anyway. If you don’t see this error message, proceed to step 10.
bitlocker-tpm-error

Running BitLocker without a TPM

4. Type gpedit.msc into the Run menu (accessible by the “Win +R” shortcut) and press “Enter” to open the Local Group Policy Editor.
run-gpedit
local-group-policy-editor-master-view
5. Navigate to “Computer Configuration -> Administrative Templates -> Windows Components -> BitLocker Drive Encryption -> Operating System Drives” in the side bar.
local-group-policy-editor-sidebar
6. Double-click on “Require additional authentication at startup” in the main window.
local-group-policy-editor-additional-auth
7. Click the radio button next to “Enabled.”
local-group-policy-editor-enabled
8. Also make sure that “Allow BitLocker without a compatible TPM” is checked, then click “OK.”
local-group-policy-editor-allow
9. Finally, we can turn on BitLocker. Right-click the target drive again and choose “Turn on BitLocker.”
bitlocker-choose-target-drive

Finishing the BitLocker Setup

10. Choose “Enter a password.”
bitlocker-enter-a-password
11. Enter a secure password.
bitlocker-set-password
12. Choose how to enable your recovery key which you’ll use to access your drive if you lose your password. I like to print mine, but it’s your choice. If you don’t have a printer, you can also save a file to your hard drive, save a file to a USB drive, or save the key to your Microsoft account.
bitlocker-recovery-key
13. Choose “Encrypt entire drive,” which is the more-secure option that encrypts files that have been marked for deletion but haven’t yet been overwritten.
bitlocker-encrypt-entire-drive
14. Unless you need your drive to be compatible with older Windows machines, choose “New encryption mode.”
bitlocker-new-encryption-method

15. Click “Start Encrypting” to begin the encryption process. Note that this will require a computer restart if you’re encrypting your boot drive. The encryption will take some time, but it will run in the background, and you’ll still be able to use your computer while it runs.
bitlocker-start-encrypting
BitLocker is powerful and easy to enable. Turning it on should be a no-brainer for anyone with a portable computer or secure data to protect.

sexta-feira, julho 07, 2017

OpenVPN ignore default route Ignore Redirect Gateway


OpenVPN ignore default route IgnoreRedirectGateway

IgnoreRedirectGateway – OpenVPN Community

Ignoring redirect-gateway

If you are running OpenVPN as a client, and the server you use is using push "redirect-gateway" then your client redirects all internet traffic over the VPN. Sometimes clients do not want this, but they can not change the server's configuration. This page explains how to override redirect-gateway so the client does not need to redirect internet even though the server says to.
Method 1: ignore

There are 2 options that can be used to ignore routes pushed by the server:--route-noexec
Don't add or remove routes automatically. Instead pass routes to --route-up script using environmental variables.

--route-nopull
When used with --client or --pull, accept options pushed by server EXCEPT for routes and dhcp options like DNS servers.
When used on the client, this option effectively bars the server from adding routes to the client's routing table, however note that this option still allows the server to set the TCP/IP properties of the client's TUN/TAP interface.


Method 2: override

Here we will simply add routes that override --redirect-gateway. This will work much like the def1 flag to --redirect-gateway works. This can be different if the server uses the def1 flag to the --redirect-gateway option or not (by checking the log while connecting). Note that net_gateway is an internal variable to openvpn and does not need to be changed to anything. If you do not know if your server uses def1 and do not want to check the logs to figure it out, just assume they DO use def1 and use the 4 routes. That will work no matter what.def1 -- Use this flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway.



If the server DOES NOT use def1 add the following options to the clients config:route 0.0.0.0 128.0.0.0 net_gateway
route 128.0.0.0 128.0.0.0 net_gateway



If the server DOES use def1 or if you do not know, add the following options to the clients config:route 0.0.0.0 192.0.0.0 net_gateway
route 64.0.0.0 192.0.0.0 net_gateway
route 128.0.0.0 192.0.0.0 net_gateway
route 192.0.0.0 192.0.0.0 net_gateway

segunda-feira, junho 26, 2017

10 Linux rescue tools for recovering Linux, Windows, or Mac machines

10 Linux rescue tools for recovering Linux, Windows, or Mac machines - TechRepublic







1: Knoppix

[UPDATE: New link] Knoppix is one of the better tools for rescuing data from sick machines. It's a full-blown live Linux distribution with a strong, user-friendly GUI that will allow you to easily mount a drive and then copy the data (which you will locate in an easy-to-use file manager) to an external source. Of course, Knoppix comes with the full arsenal of Linux commands, which place just about everything you need at your fingertips.

2: Trinity Rescue Kit

Trinity Rescue Kit might leave you wondering, "Why isn't this tool being developed faster and on a larger scale? Although TRK is rather slow to develop, what it offers is just short of amazing. Place it on a USB drive, boot your virus-laden machine, and scan the mounted drives with clamav, antivir, bitdefender, and more. This tool is all command line, so you might have to bone up on your commands to really make use of it.

3: Avira AntiVir

Avira AntiVir is a command-line antivirus tool that is fast, robust, and dependable. There is a GUI tool, but installing it is almost more trouble than it's worth. (It requires Java.) Installing AntiVir on Linux isn't the easiest of tasks, but it's certainly no kernel compilation.

4: GParted Live

GParted Live is a live Linux distribution that allows you to manipulate partitions on a drive. It supports numerous file systems and lets you can resize, create, and delete, partitions. You can run GParted Live from a CD or a USB drive, so it's very portable.

5: SystemRescueCd

SystemRescueCd is another live Linux rescue CD that offers numerous tools to handle numerous tasks, including partition manipulation, file recovery, hard disk testing, ftp, and disk formatting. As with most live Linux distributions, you can place SystemRescueCd on either or CD or USB drive, and it offers an easy-to-use GUI and plenty of tools.

6: Ubuntu Rescue Remix

Ubuntu Rescue Remix is quickly becoming one of my favorite data recovery tools. Like all good live Linux CD tools, it includes an outstanding GUI (it is Ubuntu after all) that can help you handle tasks other tools can't handle. You can recover and rescue Mac files/filesystems, recover data from nonstandard external drives, recover deleted files, and more. The one thing URR is missing is antivirus tools. But, since this is a Linux rescue disc, once installed, you can simply add the tools you need to your USB live CD.

7: F-Secure Rescue CD

F-Secure Rescue CD is based on Knoppix and allows you to check the integrity of your installed applications. It also allows advanced data repair and recovery, as well as recovery from that ever-dreaded malware!

8: Ddrescue

Ddrescue is a Linux tool designed to copy data from one file block device to another. This tool will aid you in rescuing data when your drive is suffering from read errors. Unlike many of the tools on this list, Ddrescue is not a live distribution but a tool you will use on a running Linux machine. So to rescue data, you will have to attach that troubled disk to the working Linux machine.

9: Safecopy

Safecopy is similar to ddrescue, allowing you to copy files from a disk suffering from I/O errors. It also includes a tool that allows you to read data from CDs in raw mode, as well as issue device resets and simulate bad media for testing and benchmarking.

10: Linux rescue mode

This is the only entry on the list that isn't a downloadable tool. Linux rescue mode is a mode booted with the help of a Linux boot CD, allowing you to repair a broken system. From rescue mode, you can recover a root password, repair or reinstall the boot loader, and more. When you boot into rescue mode, it will typically mount your installed system into /mnt/sysimage, where you can take care of any business necessary.

More rescue tools?

These 10 Linux tools can help you recover, rescue, and repair a Linux, Windows, or Mac machine. Of course, plenty more tools are out there. Have you come across a Linux tool that can help you repair or recover a damaged or sick drive? If so, share it with your fellow TechRepublic members.


---

1. Hiren's Boot CD

Hiren's boot cd
hiren's boot menu
Hiren BootCD is a pretty popular Linux-based rescue disc. It is tagged as “a first aid kit for your computer” and rightly so. It contains tools such as defrag tools, driver tools, backup tools, antivirus and anti-malware tools, rootkit detection tools, secure data wiping tools, and partitioning tools, among others. It is also capable of other useful utilities including re-flashing your system’s BIOS, wiping your CMOS, cleaning out temporary files and folders. You can also securely delete data or backup your data to another drive, recover damaged partitions or even scan your system to identify hardware failures. It is capable of so much more than I’ve mentioned and for a rescue system it should be the first on your list. Hiren Boot CD is available to download as an ISO for easy installation to a USB or burning to a CD.

2. Rescatux

rescatux linux rescue cd
Rescatux is a linux-based distribution designed to fix problems with both Linux and Windows. It is currently in beta but nonetheless proves more than enough to make it on our list. It comes with an app/wizard called Rescapp that provides access to the tools available on Rescatux CD. With the aid of Rescapp, you can perform tasks such as resetting passwords, restoring grub on linux or the Master Boot Record on Windows. You can also perform checks for your filesystem, repair damaged partitions and recover deleted files. Don’t let the beta tag fool you as it can be quite a useful tool at your disposal.

3. The Ultimate Boot CD

the ultimate boot cd rescue kit
Ultimate Boot CD is a bootable rescue CD that comes with a variety of tools integrated into that give you the functionality and ability to perform some very userful rescue operation  on your computer. The disk is made up of a collection of bootable disk images, all stored on a bootable CD. Boot the CD, then choose a disk image and then the system boots from the image, and you're running the programs on the disk. Each image come wth different tools and utilities as well as different interfaces. You are provided with a wide range of tools including data recovery, drive cloning, BIOS management, memory and CPU testing tools. It is available for download in a ISO format and can easily written to USB or CD. Skilled users can do a lot with this tool but for the novice, you should be careful not to break their system beyond repair.

4. Tiny Rescue Kit

tiny rescue kit
The Trinity Rescue Kit is a Linux-based Rescue CD designed for the recovery and repair of either Windows or Linux machines. You may load it up on a USB (or CD) and boot it up. The boot menu offers a choice of boot options synonymous with most linux distributions so you can try different modes if the default does not work for you. Once booted up, you’re provided with a range of tools allowing you to reset lost Windows passwords with Winpass, backup data, recover data, clone drives, modify or recover partitions and run rootkit detection. There are also a ton of antivirus scanners provided including Avast, Clam AV and BitDefender. You shouldn’t be intimidated by the text based interface as it is pretty simple to use. You can grab it from here.

5. System Rescue CD

system rescue cd
SystemRescueCD is a powerful tool for repairing Linux systems. It has been developed with system administrators in mind. It can be used to troubleshoot both Windows and Linux servers and systems. When you boot up the system, you’re taken into a console interface so you ought to know your way around. It has a wide range of tools that allow you to manage and repair partitions. You can also backup your data and resolve bootloader issues. You can also provided with a ton of antivirus and rootkit detection and removing tools. SystemRescueCD is available for download as an ISO file so you can burn it to a CD or use it to create a bootable USB drive.

quinta-feira, junho 08, 2017

Sony D66xx 6633 Z3 Z3 Z3 DUAL UNOFFICIAL LineageOS 14.1 build 2017-06-07

You need flashtool and drivers...


https://forum.xda-developers.com/z3/orig-development/7-1-cyanogenmod-t3508140

Downloader and maitainer above!


Steps I did in order to make it work!


First Root with locked bootloader to backup TA

Procedure:
Thread is this -> https://forum.xda-developers.com/crossdevice-dev/sony/giefroot-rooting-tool-cve-2014-4322-t3011598

1. Get root on old firmware with @zxz0O0 masterpiece tool (OP) and install Dual Recovery by @[NUT]
PS To install dual recovery I had first to install latest busybox using busybox installer (busybox.net)
2. Create a pre-rooted firmware from latest .77 fw ftf with the not less outstanding PRFCreatortool, including latestSuperSU and Dual Recovery flashable zips (just follow thread instructions)
3. Put pre-rooted firmware flashable zip at internal memory (/sdcard0)
4. Open NDR Utils app and reboot into TWRP recovery
5. Flash pre-rooted firmware and then... POWER OFF device (DO NOT REBOOT)
6. Open FlashTool and flash latest .77 fw - EXCLUDING System !!!
7. Done!

You will get latest .77 fw rooted with dual recovery installed!
Above procedure must work to get lollipop rooted too (from KK to L)!

---
YOU NEED TO HAVE NEW BOOTLOADER

https://forum.xda-developers.com/z3/development/z3-twrp-2-8-7-0-d6603-t3273996

Flash a ROM abobe version .200 ex.: D6633_Customized BR_1288-7359_23.5.A.1.291_R5D, when you create the bundle on flashtool D6633_23.5.A.1.291_R5D_Customized BR_1288-7359.ftf, import add ALL files...


s1 D66x3 installation:
LA3.0_L_15.4 : is preinstalled. (.200 and above)
This will make you have new bootloader and leave FOTAKernel to have a bootloader on it's partition.


flash lineageOS kernel with: (download lineageOS boot.img is inside .zip file)
For fastboot turnoff your phone press volume up + power it vibrates 3 times (mean it's turned off)
Fastboot just press volume UP and connect usb cable

fastboot flash boot boot.img

flash recovery by using command:

fastboot flash FOTAKernel

then reboot with

fastboot reboot
---
Now go into twrp or whatever bootloader your choice, do a full reset and user adb sideload to load LineageOS and Gapps as commands bellow:

For me go into twrp was little tricky I needed to turn phone on them press volume down several times, like click on/off

adb sideload lineage-14.1-20170607-xkeita-z3dual.zip
adb sideload open_gapps-arm-7.1-micro-20170608.zip

You should have lineageOS in you Sony Xperia Z3
---
Camera (optional)

DRM Function Restore / Backup-TA-9.11
https://forum.xda-developers.com/z3/general/drm-function-restore-t2995798
https://forum.xda-developers.com/crossdevice-dev/sony/xperia-z1-z2-z3-series-devices-drm-t2930672


1.Flash ftf file "23.0.1.A.5.77" by Flashtool. - Wipe appslog, cache, data - and reset customizations
2.Relock bootloader by Flashtool.
3.Flash ftf file "23.0.1.A.5.77" by Flashtool AGAIN. - Wipe appslog, cache, data
4.Unlock bootloader by Flashtool.
5.Flash boot.img "AndroPlusKernel v12" by Fastboot.
6.Install DRM restore zip by TWRP.
7.reboot.

Requirements:
Unlocked bootloader
flashtool
.77 based firmware for D6653 (I tried several firmwares but the one that worked for me was the .77 firmware for PH market downloaded from flashtool)
AndrosPlusKernel v15 (extracted boot.img from the zip to be flashed)
DRM restore zip from that original thread above (placed in sd card)

Note - Key here is to not restart/boot the phone after each step in the instructions above. Just keep phone off and unplugged after each step. I realized that leaving the phone connected in flashmode for a while will make it boot, so I just unplugged it while waiting for flashtool to prepare FTF for flashing. Then plug it in again with vol down button pressed.

domingo, junho 04, 2017

Top 4 open source ERP systems | Opensource.com

Top 4 open source ERP systems | Opensource.com



04/jun/2017



op 4 open source ERP systems

Businesses with more than a handful of employees have a lot to balance including pricing, product planning, accounting and finance, managing payroll, dealing with inventory, and more. Stitching together a set of disparate tools to handle those jobs is a quick, cheap, and dirty way to get things done.
That approach isn’t scalable. It’s difficult to efficiently move data between the various pieces of such an ad-hoc system. As well, it can be difficult to maintain.
Instead, turn to an Enterprise Resource Planning (ERP) system.
The big guns in that space are Oracle, SAP, and Microsoft Dynamics. Their offerings are comprehensive, but also expensive. What happens if your business can’t afford one of those big implementations or if your needs are simple? You turn to the open source alternatives.
There are a number of flexible, feature-rich, and cost effective open source ERP systems out there. Here is a look at four of them.

What to look for in an ERP system

Obviously, you will want a system that suits your needs. Depending on those needs,more features doesn’t always mean better. However, you needs might change as your business grows so you’ll want to find an ERP system that can expand to meet your new needs. That could mean the system has additional modules, or just supports plugins and add-ons.
Most open source ERP systems are web applications. You can dowload and install them on your server. But if you don’t want to, or don’t have the skills or staff to, maintain a system yourself then make sure there’s a hosted version of the application available.
Finally, you’ll want to make sure that the application has good documentation and good support—either in the form of paid support or an active user community.

Odoo

Odoo is an integrated suite of applications that includes modules for project management, billing, accounting, inventory management, manufacturing, and purchasing. Those modules can communicate with each other to efficiently and seamlessly exchange information.
While ERP can be complex, Odoo makes it friendlier with a simple, almost spartan interface. The interface is reminiscent of Google Drive, with just the functions you need visible.
Odoo is a web-based tool. Subscriptions to individual modules will set you back $20 (USD) a month for each one. You can also download it or grab the source code from GitHub.
You can give Odoo a try before you decide to sign up.

ERPNext

ERPNext was featured on Opensource.com last November, and it’s one of those classic open source projects. It was designed to scratch a particular itch, in this case replacing a creaky and expensive proprietary ERP implementation.
ERPNext was built for small and medium-sized businesses. It includes modules for accounting, managing inventory, sales, purchase, and project management. The applications that make up ERPNext are form-driven—you fill information in a set of fields and let the application do the rest. The whole suite is easy to use.
If you’re interested, you can test drive ERPNext before taking the plunge and downloading it or buying a subscription to the hosted service.

Dolibarr

Like ERPNext, Dolibarr is aimed at small and medium-sized businesses. It offers end-to-end management of your business from keeping track of invoices, contracts, inventory, orders, and payments to managing documents and supporting electronic point-of-sale system. It’s all wrapped in fairly clean interface.
If you’re wondering what Dolibarr can’t do, here’s some documentation about that.
In addition to an online demo, Dolibarr also has an add-ons store from which you can buy software that extends Dolibarr’s features.

Opentaps

Unlike the other ERP systems that this article discusses, Opentaps is designed for larger businesses. To that end, it packs a lot of power and flexibility.
You get the expected set of modules that help you manage inventory, manufacturing, financials, and purchasing. You also get an analytics feature that helps you analyze all aspects of your business. You can use that information to better plan into the future. Opentaps also packs a powerful reporting function.
On top of that, you can buy add-ons and additional modules to enhance Opentaps’ capabilities. There are only a handful available right now, but they include integration with Amazon Marketplace Services and FedEx.
Before you download Opentaps, give the online demo a try.

sábado, junho 03, 2017

How to rename or remove multiple files using find in linux

The following is a direct fix of your approach:
find . -type f -name 'file*' -exec sh -c 'x="{}"; mv "$x" "${x}_renamed"' \;
However, this is very expensive if you have lots of matching files, because you start a fresh shell (that executes a mv) for each match. And if you have funny characters in any file name, this will explode. A more efficient and secure approach is this:
find . -type f -name 'file*' -print0 | xargs --null -I{} mv {} {}_renamed
It also has the benefit of working with strangely named files. If find supports it, this can be reduced to
find . -type f -name 'file*' -exec mv {} {}_renamed \;
The xargs version is useful when not using {}, as in
find .... -print0 | xargs --null rm
Here rm gets called once (or with lots of files several times), but not for every file.
I removed the basename in you question, because it is probably wrong: you would move foo/bar/file8 to file8_renamed, not foo/bar/file8_renamed.
Edits (as suggested in comments):
  • Added shortened find without xargs
  • Added security sticker

find . -type f -name 'file*' -execdir mv {} {}_renamed ';'
Remove:
find . -type f -name 'file*' -exec rm -v {} \;