[Arm-netbook] Mysteries of Lemote Yeeloong MIPS netbook
luke.leighton
luke.leighton at gmail.com
Sun Oct 21 04:58:03 BST 2012
simon, thanks for being patient here. i really appreciate your approach
here.
On Sun, Oct 21, 2012 at 12:01 AM, Simon Kenyon <simon at koala.ie> wrote:
> you have a deep seated concern
deep seated _justified_ concern, from what i can gather.
> that your safety and security is
> compromised by the technology that you use. without a *firm* grasp of
> the underlying principles that guide the design and construction of that
> technology; you are forever beholden to rely on others.
>
>
yyup. ya gotta work out who to trust, freebirds. logically think the
chain through.
you can rely on SHA and MD5 checksums. you can trust the linux distros if
they're checksum'd. you can rely on CD recorders if you can use a
different CD *reader* to verify the MD5 checksum. you can use chrootkit
and rkhunter to checksum the programs on the hard drive (your best bet here
is again removing the drive, putting it into a USB enclosure and using a
machine that's disconnected from the internet and is kept locked in a safe
when unused, or even thrown away and a new one bought 2nd-hand just for the
job, or use other peoples' computers once and only once, booted off of a
trusted verified live CD)
> you might consider going to a good bookshop and getting a few good
> (paper) books. pretty much everything by o'reilly is worth looking at.
>
yes. actually. this is a great idea. it will stop you focussing on the
problem.
much as i hate to say this, many of the questions you're asking aren't
entirely appropriate for the target audience here: basic linux sysadmin
analysis for example.
you need to get yourself up-to-speed, and doing so "offline" - paper books
- would be a very good way to do that.
l.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.phcomp.co.uk/pipermail/arm-netbook/attachments/20121021/86fe68d9/attachment.html
More information about the arm-netbook
mailing list