DSL Embedded :: saving settings dsl sessions/usb
Yes, I suppose this thread should be under the embedded section.
What you can do to save your settings is to create a virtual hdd, then partition and format it in DSL after launching qemu with it.
Afaik there should still be those docs and/or README's that come with the embedded package. Please read those first, then search the forums/wiki/etc if you need more info. If you still are stuck, feel free to ask for help.
lucky13: I suppose the "safest" bet would be to save your login details in cookies
Saving setting in Qemu environment is explained in the readme file. It is not as simple as a native boot but can be achieved with a virtual drive or samba
Yes I did see the virtual hard drive setup in the docs this confirms my suspicion. I will try that.
To Lucky 13
Easy big guy!! I completely agree that I am exposed to anyone sniffing traffic on the internet cafe. But I do gain security advantages that I would not on their PC.
1) I am not vulnerable to any malicious code or most viruses because they are written mostly for windows not Linux (99%).I am not using the hard drive of the cafes machine to access the necessary apps firefox etc therefore almost elimanating exposure to malicous code and viruses that are running or on the infected drive.
3) I am careful to use only ssl protected sites for banking and email retrieval which again minimizes my exposure to password theft.
Thanks for the comments.
Just for discussion's sake:
If you run something under a host OS, I would think that you would still be vulnerable to malicious code from the host, such as software keyloggers. Then again, there may be a hardware(?) keylogger. Or subject to phishing due to redirection by some network proxy, etc. I would not be surprised if people hard reset public machines after use just to clear volatile memory, heh heh.
IMO, it just boils down to trust and your personal paranoia :P
I did not know this would turn into security on the road thread but here goes. As I mentioned before the advantage of the embedded linux does not use the applications on the host OS or the host OS for that matter this using a linux os fufills one of the security axioms " security by obscurity" because most viruses,malware, trojans are written forwindows not linux this takes care of a great piece of the problem. The first thing I do is rebbot the machine, most places will let you do this. The second is perouse task manager to check for any keylogger apps or anything suspicious and kill anything I dont like. Most software keyloggers monitor certain apps like email or web browsers when opened are used to record keystrokes, this wont happen with me because I dont use any of host os apps. Assuming this wont always be the case and there is a hardware or software keylogger that records all keystrokes I dont use the keyboard to enter sensitive passwords I cut and paste them from a encrypted password app this app never exposes the actual password so this also eliminates shoulder surfing. You could also use a virtual keyboard app that allows you enter the passwords by point and click but I have not found a good one yet. Also my banking site uses visual keys and a redirect attack will not work I will know something is up when my visual cue is wrong. And finnaly before I leave I reboot again.
Again I am not ever completely safe in these environments but the point is to minimize by exposure. Any further suggestions would be welcome.