Displaying 4 results from an estimated 4 matches for "convenince".
Did you mean:
convenience
2018 Jun 24
2
Read-only Guests for Anti-Forensics
Hello. I'm interested in running guests as read-only to turn them into a
sort of virtualized "live=cd". The goal is to leave no forensic evidence
on the host disk or virtual one which would lead to traces on the host
still- similar to how TAILS works but with the added convenince and
flexibility of running in a VM. If I set the qcow image to read-only as
per the manual, will any changes made during a session be written to
disk (or a transient file on disk)?
2004 Aug 21
1
Number and name for SIP extension at the same time ?
Hi,
I'd like to have local extensions accessible through SIP uri (like
Joe@company.com), but at the same time for convenince to be also extension
with number (like 100) for more convenient dialing thought softphones that
support only numeric keys.
Can this be done ? Since I'm newbie, I'd really appreciate small example...
Thanks in advance,
regards,
Robert.
2018 Jun 26
0
Re: Read-only Guests for Anti-Forensics
...Hello. I'm interested in running guests as read-only to turn them into a
> sort of virtualized "live=cd". The goal is to leave no forensic evidence
> on the host disk or virtual one which would lead to traces on the host
> still- similar to how TAILS works but with the added convenince and
> flexibility of running in a VM. If I set the qcow image to read-only as
> per the manual, will any changes made during a session be written to
> disk (or a transient file on disk)?
Filesystems such as ext4 require write access to the device so they can
play back the journal when mou...
2018 May 19
5
Virtio-net drivers immune to Nethammer?
Hi I'm a privacy distro maintainer investigating the implications of the
newly published nethammer attack [0] on KVM guests particularly the
virtio-net drivers. The summary of the paper is that rowhammer can be
remotely triggered by feeding susceptible* network driver crafted
traffic. This attack can do all kinds of nasty things such as modifying
SSL certs on the victim system.
* Susceptible