All honour goes to http://www.blaicher.com/2013/01/accessing-an-encrypted-full-disc-image-lukslvm/
So I typically use a full disc encryption with LVM over LUKS. So assume you have got an image from your harddisk via
dd if=/dev/sda of=image.img
function Find-Exact-FileWithProgress { | |
param ( | |
[string] $BasePath, | |
[string] $FileName | |
) | |
$files = Get-ChildItem -Path $BasePath -Recurse -File -ErrorAction SilentlyContinue | |
$total = $files.Count | |
$counter = 0 |
#!/bin/bash | |
LABEL="OVERLAY_ROOT" | |
FSTYPE="ext4" | |
# Find all devices with the label | |
DEVICES=($(blkid | grep "LABEL=\"$LABEL\"" | cut -d: -f1)) | |
COUNT=${#DEVICES[@]} |
@echo off | |
cls | |
echo ======================================== | |
echo DNS Flush Utility - Windows | |
echo ======================================== | |
echo. | |
set /p userinput=Do you want to flush the DNS cache now? (y/n): | |
if /i "%userinput%"=="y" ( | |
echo. |
# do sha256asum for each file | |
# find . -type f ! -name "*.sha256sum" -exec bash -c 'for f; do echo "Processing: $f"; (cd "$(dirname "$f")" && sha256sum "$(basename "$f")" > "$(basename "$f").sha256sum"); done' _ {} + | |
# find . -type f ! -name "*.sha256sum" -exec sh -c 'for f; do echo "Processing: $f"; (cd "$(dirname "$f")" && sha256sum "$(basename "$f")" > "$(basename "$f").sha256sum"); done' _ {} + | |
# if you want to skip existing | |
#find . -type f ! -name "*.sha256sum" -exec sh -c 'for f; do if [ -f "$f.sha256sum" ]; then echo "Skipping (already exists): $f.sha256sum"; else echo "Processing: $f"; (cd "$(dirname "$f")" && sha256sum "$(basename "$f")" > "$(basename "$f").sha256sum"); fi; done' _ {} + | |
# check each file sha256sum is match | |
# find . -type f -name "*.sha256sum" -exec sh -c 'cd "$(dirname "{}")" && sha256sum -c "$(basename "{}")"' \; |
FROM ubuntu:18.04 | |
ENV DEBIAN_FRONTEND=noninteractive | |
# Install core dependencies | |
RUN apt-get update && apt-get install -y \ | |
curl \ | |
bash \ | |
grep \ |
echo "Usb power status:" | |
echo "" | |
sudo cat /sys/bus/usb/devices/*/power/level | |
echo "" | |
echo "" | |
while true; do | |
read -p "Do you wish to change usb power status? " yn | |
case $yn in | |
[Yy]* ) make install; break;; |
sudo apt update | |
sudo apt-get install tigervnc-scraping-server | |
mkdir -p ~/.vnc | |
vncpasswd | |
x0vncserver -passwordfile ~/.vnc/passwd -display :0 | |
All honour goes to http://www.blaicher.com/2013/01/accessing-an-encrypted-full-disc-image-lukslvm/
So I typically use a full disc encryption with LVM over LUKS. So assume you have got an image from your harddisk via
dd if=/dev/sda of=image.img