search for: convenince

Displaying 4 results from an estimated 4 matches for "convenince".

Did you mean: convenience
2018 Jun 24
2
Read-only Guests for Anti-Forensics
Hello. I'm interested in running guests as read-only to turn them into a sort of virtualized "live=cd". The goal is to leave no forensic evidence on the host disk or virtual one which would lead to traces on the host still- similar to how TAILS works but with the added convenince and flexibility of running in a VM. If I set the qcow image to read-only as per the manual, will any changes made during a session be written to disk (or a transient file on disk)?
2004 Aug 21
1
Number and name for SIP extension at the same time ?
Hi, I'd like to have local extensions accessible through SIP uri (like Joe@company.com), but at the same time for convenince to be also extension with number (like 100) for more convenient dialing thought softphones that support only numeric keys. Can this be done ? Since I'm newbie, I'd really appreciate small example... Thanks in advance, regards, Robert.
2018 Jun 26
0
Re: Read-only Guests for Anti-Forensics
...Hello. I'm interested in running guests as read-only to turn them into a > sort of virtualized "live=cd". The goal is to leave no forensic evidence > on the host disk or virtual one which would lead to traces on the host > still- similar to how TAILS works but with the added convenince and > flexibility of running in a VM. If I set the qcow image to read-only as > per the manual, will any changes made during a session be written to > disk (or a transient file on disk)? Filesystems such as ext4 require write access to the device so they can play back the journal when mou...
2018 May 19
5
Virtio-net drivers immune to Nethammer?
Hi I'm a privacy distro maintainer investigating the implications of the newly published nethammer attack [0] on KVM guests particularly the virtio-net drivers. The summary of the paper is that rowhammer can be remotely triggered by feeding susceptible* network driver crafted traffic. This attack can do all kinds of nasty things such as modifying SSL certs on the victim system. * Susceptible