Linux - Reddit – Telegram
Linux - Reddit
778 subscribers
4.19K photos
207 videos
39.9K links
Stay up-to-date with everything Linux!
Content directly fetched from the subreddit just for you.

Powered by : @r_channels
Download Telegram
Permissively-licensed MTP device implementation

Introducing cmtp-responder - a permissively licensed Media Transfer Protocol (MTP) responder implementation which allows embedded devices to provide MTP services and supports a core set of MTP operations.


[https://www.collabora.com/news-and-blog/blog/2019/05/16/permissively-licensed-mtp-device-implementation/](https://www.collabora.com/news-and-blog/blog/2019/05/16/permissively-licensed-mtp-device-implementation/)

https://redd.it/bpfgpk
@r_linux
new password manager

Hi Everyone,

Just wanted to share a great discovery I made last year. I am a heavy user of the command line and I had long been searching for a good password manager that fit my way of working. I found it in [Avendesora](https://avendesora.readthedocs.io). I find most other password managers very constraining and cumbersome. And I am not comfortable trusting the security of pre-packaged or cloud-based managers.

You can run Avendesora from the command line, or you can link it to a hot key so that you can auto-type passwords into running applications such as a web browser or a terminal window.

Avendesora is capable of both storing and generating secrets like passwords and security questions, and its generator is very flexible. And unlike most password managers that are designed largely to just manage usernames and passwords, Avendesora is designed to hold a wide variety of information about an account and make it easily available.

Just to give an example of how flexible it is, I have an account at a cryptocurrency exchange that contains two different usernames (public and private), 4 different passwords (login, trading, funding, and master), and a time-based second-factor (OTP). With Avendesora I can enter my username, login password, and OTP in a single keystroke. Approving an action that requires a secondary password also requires a single keystroke, Avendesora recognizes the page from the URL and uses the appropriate password.

Avendesora also has a nice API, which I use to write little utilities that need access to account information or passwords. For example, I used it to export selected accounts to BitWarden so I can access them on my phone.

Avendesora is free software, is written in Python, and uses GPG for encryption. I have looked at the source; it is cleanly and thoughtfully written. I find no hint of questionable code. It seems well documented and well supported.

I have been using Avendesora for a while now and love it. I recommend that you check it out.

\-Tiana

https://redd.it/bpghcr
@r_linux
Kernel 5.1 Boot news ?



I've read that kernel 5.1 can boot to a device-mapper device without using initramfs. More details:

"previous kernel versions required the presence of an initramfs image to boot the system to a file system locate in a device-mapper device, but there were many cases where users couldn't use an initramfs image, so this new feature comes in handy when you want to boot to a device-mapper device without the need of an initramfs image, just by using a simple kernel boot parameter".

Maybe this can help booting linux on arm devices/boards/smartphones ?

https://redd.it/bphjnt
@r_linux
Does anyone know what happened? It's not loading my normal ubuntu, instead it's running a terminal
https://redd.it/bplrfm
@r_linux
Practicing Data Recovery - methods?

So it's been a long, long time since I've had to attempt to recover any data. Anything that is important to me (photos) I keep multiple backups of in different locations.

That being said, linux is a pretty powerful tool for data recovery and I just happen to have retired a couple of old 500GB HDD's.

I saw a post today about a guy who is having to do some data recovery because of a power outage (I personally use a pure-sine UPS). The post got me thinking, if for whatever reason I had to recover some data tomorrow - I don't really have a clue.

So, I'm going to load up those old HDD's with some random data - screw up the drives and see how recovery goes.

My questions to those of you who know:

**What are some scenarios of types of data that would be easy or difficult to recover, ranked from easy to hard?**
i.e., Recovering an Operating System drive, recovering photos, recovering plain text, recovering pdf's, recovering compressed files, recovering encrypted things (and then being able to access the encrypted data provided you still have the key).

Are full disks harder/easier to recover than ones with x% of space available, certain types of file formatting systems more or less difficult, certain operating systems make recovery more or less difficult, etc.

**What are some methods that I could use to "break" the drives that would require recovery (that is possible without special equipment) that simulate something that might actually happen to a person?**

i.e., sudo rm -rf /\*, deleting partitions, partitioning incorrectly, deleting boot sectors, simply accidentally deleting the wrong file, doing something weird while compressing files, etc.

I'm only going to attempt recovery at a software level using free tools available on linux, no hardware or dissassembly and no proprietary tools.

https://redd.it/bpe9yz
@r_linux
I am a design student willing to contribute to opensource

this is little offtopic to /r/linux

I am an animation student willing to contribute to opensource. What are some oss projects(strictly technical/only design) I can contribute to?



Thanks!

https://redd.it/bpnitt
@r_linux
Visudo help with id command

Hello,

​

I am setting up a bash/html CGI that will allow me to generate graphs with GnuPlot under RedHat 7.6.


My tutor ask me to create a cgi noscript that will be able to return a sudo id (root) without a password.


Actually, if I add the id command in one of my cgi-noscript, the return is :


uid=48(apache) gid=48(apache) groups=48(apache) context=system_u:system_r:httpd_sys_noscript_t:s0



But I want this return :


uid=0(root) gid=0(root) groups=0(root) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023




So I going on the the visudo file and I add :


httpd ALL=(root) NOPASSWD: id


But it doesn't work. And I don't know if I have to put "httpd" or "apache"...
The objective is to learn how this file works.


Can you help me ?

https://redd.it/bpp14l
@r_linux
PSA: NoMachine works on Wayland

Just wanted to post here because I'm sure many people don't know this. I discovered by accident that NoMachine works on Wayland! Quickly tested this on Sway and Gnome with the latest NoMachine on Arch Linux.

EDIT: To clarify, incoming connections are what I'm talking about. That's the big news here

https://redd.it/bpqwfr
@r_linux