Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- fully_encrypted_debian
- t scheme, what's the point if it falls to a cheap keylogger?// // //**-> TROTZDEM: ein ungesichertes u... sable. # Using userspace crypto wrapper to access keyslot area. # Generating LUKS header version 1 usin... sh sha256: 859488 iterations per second (256-bits key). # Data offset 4096, UUID a2153267-0072-4f0d-863... ng LUKS header of size 1024 on device /dev/sda1 # Key length 32, device size 351649792 sectors, header
- dnssec
- auf yes, sollte aber für das Management des root-key (/var/cache/bind/managed-keys.bind) in /etc/bind/named.conf auf dnssec-validation auto gestellt werden. Ferner sollte mit der Option key-directory für die Schlüssel ein eigenes Verzeichn... tc/bind/named.conf options { .... key-directory "/var/chache/bind/keys"; dnssec
- hardware @linux:debian
- oxy="http://proxy01.ukbw.de:3128/" ### LiHAS GPG-Key importieren: wget -O - http://ftp.lihas.de/lihas-kernel/apt-key-lihas.gpg | apt-key add - ### ggf. VirtualBox-GPG-Key importieren: wget -q http://download.virtualbox.org/virtualbox/de
- sign @linux:email:amavisd:dkim
- {{:debian-2.png}} === Domain Key Identified Mail outbound - ORIGINATING - signieren === DKIM basiert au... etrischer Verschlüsselung mit public- und private-Key.\\ Das Key-Paar wird mit folgender Syntax erzeugt: \\ <code> amavisd genrsa <Dateiname> [Anzahl der Bi... Also z.B. am 26. August 2014, als Version 01 des Keys: <code console> # amavisd-new genrsa /etc/postfi
- all @linux:debian
- oxy="http://proxy01.ukbw.de:3128/" ### LiHAS GPG-Key importieren: wget -O - http://ftp.lihas.de/debian/apt-key-lihas.gpg | apt-key add - ### Ueberpruefgung, ob Key-Import erfolgreich war: apt-key list ## APT (Aptitude) konfiguriere
- openssl_ca @linux:commserv:ca
- rtificate ... Generating a 1024 bit RSA private key .....++++++ .....................................++++++ writing new private key to './demoCA/private/./cakey.pem' Enter PEM pas... n7:/usr/share/ssl/misc # openssl req -new -nodes -keyout newreq.pem -out newreq.pem Generating a 1024 bit RSA private key ....++++++ .++++++ writing new private key
- tipps @linux:ssh
- ==== SSH Tipps ==== === SSH-Key auf entferntem Server einspielen === <code console> ssh-copy-id root@H... ot@HOSTNAME'", and check in: ~/.ssh/authorized_keys to make sure we haven't added extra keys that you weren't expecting. </code> um den SSH-Public-Key auf den Server HOSTNAME zu kopieren. \\ \\ === al
- ldap_secure @linux:commserv:ldap
- TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /etc/ssl/private/station7_key.pem TLS_REQCERT demand \\ === Modifying /etc/openldap/slapd.conf === ... TLSCertificateKeyFile /etc/ssl/private/station7_key.pem TLSCACertificateFile /etc/ssl/certs/ca_cert... ad server done A SSL_connect:SSLv3 write client key exchange A SSL_connect:SSLv3 write change ciphe
- config @linux:commserv:apache2
- aut user-interaction is also to store a decrypted key, since without Apache will ask at every start for... the password...\\ mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apache2/private/station7_decryp
- cyrus_secure @linux:email:cyrus
- cert_file: /etc/ssl/certs/station7_cert.pem tls_key_file: /etc/ssl/private/station7_key.pem \\ === SSL for imap - imaps === Modify / append the SSL-setti... ert_file: /etc/ssl/certs/groupware_cert.pem tls_key_file: /etc/ssl/private/groupware_key.pem tls_cipher_list: TLSv1:STARTTLS:SSLv3:SSLv2:!NULL:!EXPORT:!
- monitoring @linux:email:monitoring
- -----------------------\n"; foreach my $key (reverse sort { $count{$a} <=> $count{$b}} keys %count) { print"$count{$key}\t$key\n"; } print <<FOOTER; <table border="0" width="400"> <tr> <td align="lef
- neues_certificate @linux:ejabberd
- ile erzeugen:\\ * in CA Certificate und private-Key erzeugen und nach /etc/ejabberd auf jabber-Server... <code console /etc/ejabberd/> cat jabber@ukbw.de-key.pem > ejabberd.pem cat jabber@ukbw.de-cert.pem >>... > \\ **WICHTIG:** Reihenfolge: zuerst den private-Key und dann das Certificate!\\ \\ Bei Fehlermeldung
- ca @linux:commserv:ca
- icate Authority ==== === generate certificate and key-files using e.g. one of the follwing === * [[co... I thought, I could use the same certificate- and key-file for the **T**ransport **L**ayer **S**ecurity... Postfix smtpd. But I failed ;-) \\ The certs and keys in /etc/ssl/ are owned by root and this caused s
- pam @linux:commserv:ldap
- UM:+LOW:+SSLv3:+EXP # Client certificate and key # Use these, if your server requires client aut... tication. tls_cert /etc/ssl/certs/station7_cert.pem tls_key /etc/ssl/private/station7_key.pem \\
- postfix_secure @linux:email:postfix
- le = /etc/ssl/certs/station7_cert.pem smtpd_tls_key_file = /etc/ssl/private/station7_key.pem smtpd_tls_received_header = yes smtpd_tls_session_cache_t... ldump -d -i lo -k /etc/ssl/cyrus/private/station7_key.pem port 465 \\ \\ <- [[linux:email:email|zurüc