![]() name 'node_modules' -type d -prune -exec rm -rf ''Ĭopy your home to an external drive. Feel free to adapt them to the project you have. You can remove them manually or use the following command lines to remove all the folders with a given name in your home directory. Moreover, it is easy to reinstall them after your reinstallation. įirst, you might not want to backup folders like node_modules or other project libraries as they can be very long to copy due to the very large amount of file they contain. (optional): remove all node modules, venv, composer dependencies. (optional) Back up your data if you want to restore it after installationĭisclaimer: you will still have to reinstall your apps, but they should restore their current settings after reinstallation. If you want to set up a dual boot, or enable Windows 10 disk encryption alongside Linux disk encryption, I recommend you switch to this longer, more complete tutorial by Mike Kasberg. This article will not cover dual boot set-up, and assume that you either already have a fully-functional dual boot on your device, or your device is ready for installing Ubuntu on dual boot, or you don't need it. Tutorial part: How to set up full disk encryption on Ubuntu Full disk encryption leverages those two trade-offs as it provides faster kernel-level encryption, and encrypts your whole Ubuntu installation (except the boot partition).And any information can be temporarily stored in you swap space. Also, some programs keep information in temporary files or log files. Your computer also contains files outside your home directory that can also provide information on you, such as the installed library or softwares for example.As a consequence, it can be slow, especially when you need to copy or download lots of files (when installing software or project dependencies for example). Encryption is handled at the application level.This is a very convenient practice, however it comes with major trade-offs: On Ubuntu, you can encrypt your home folder after installation to protect the files inside. Encryption is a way to prevent that, as an encrypted file can not be understood without the key to decode it.Sarah Pike on Kaspersky's blog, Jan.29 2021 Encryption to the rescue! Another 74% gave up the goods when the researchers applied file-carving methods. An overwhelming majority of the devices the researchers examined contained at least some traces of data - mostly personal but some corporate - and more than 16% of the devices gave the researchers access outright. "Kaspersky’s Global Research and Analysis Team (GReAT) has examined security in secondhand devices. In this video, the French Youtuber Micode shows us how he managed to collect sensitive data and files from second-hand hard disks he bought online:Īlso in January 2021, Kaspersky published on their blog an edifying study on data exposed in second-hand devices: **90% of the second-hand devices contain sensitive data!** Nowadays, shady organizations buy second-hand laptops or hard drives to collect sensitive information about their former owner and sell them. ![]() ![]() How is it technically possible and how to prevent it? Your password does not protect your files and dataĮven without your password, someone with access to your hard disk can mount it on another operating system (for example by using an Ubuntu live USB key, a very common thing) and access some of the files it contains! It is an easy hacking practice. It would also make it easier for rival companies to copy your product. If the source code of one of your projects leaks, it makes it easier for hackers to find security breaches in your product or application. If the stolen machine belongs to a company and contains employee credentials (VPN access for example), they can be used as an entry point on your company network, for a bigger cyber-attack such as ransomware. You for your personal pictures, for example and your organization for sensitive information, blueprints or source code. ![]() You or your organization can be the victim of blackmailing. The point is you can not realize that your number has been stolen until they use it. Stolen card numbers are very often sold to groups that will use them to perform online payments on the internet. Your social security number, your id, or other administrative documents can be used to open bank accounts or credits in your name! Fraudulent banking transaction administrative documents (come one, we all store scans of our id or our social security number somewhere.).password or credit card numbers saved in your browser (and so on, access to your drive, important online accounts such as administrative ones, bank.).It goes without saying that your computer can contain sensitive information about you or the organization you are working for, such as: ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |