Skip to main content

New answers tagged

0 votes

Is /dev/random data a psuedo-random AES cypher, and where does the entropy come from?

The current accepted answer is outdated. Linux now uses ChaCha20, a fast stream cipher, to generate pseudorandom data. Entropy is collected from a variety of sources, primarily the timing of ...
forest's user avatar
  • 3,165
2 votes

checking for strong passwords in Linux as an admin

is there some acceptable means [via software?] to validate all set passwords are in fact up to some standard of character length and complexity, without actually finding out the set password of an ...
Marcus Müller's user avatar
2 votes

checking for strong passwords in Linux as an admin

I can think of several ways to ensure all passwords meet standards: Intercept the password when the user is logging in and verify it, maybe pretend it is expired if it isn't good enough. (I'm not ...
user10489's user avatar
  • 10.9k
0 votes

Is UFW behind a firewall(ed) gateway router necessary

They do say it best to have more, as suggested in terms of security strategy against threats. "" The defense-in-depth approach Relying only on your router's firewall is insufficient because ...
Matt2010's user avatar
1 vote

Restricting wayland GUI applications from accessing all screen content

While I'm aware that the socket -- looking at it as a file with its file permissions -- is either all or nothing (read+write or not, hence the protocol is bidirectional), I was still expecting the ...
grawity's user avatar
  • 15k

Top 50 recent answers are included