I have downloaded Mageia 4 and it says that after downloading I should verify the signatures. I burned the ISO to a DVD and explored that but no luck. Please could someone tell me how I verify a signature. This must be basic stuff but it stumped me.
I am using Ubuntu 14.10, but i think i would have the same question for other Linux oss.
I have downloaded an open source application from Blender.org...at least, i think i have.
How do i verify the app is downloaded
and how do i get it to run, that is, how do i put the app's icon on my desktop?
...thanks,
gmo
Hello sir, i want your help to know that in order to add security to ZRP which are the files where we have to make the modifications for encryption, digital signature etc.. as i have very less knowledge regarding so plz help me from the basic level as what should be done in SZRP.
Was running Windows 8.1 Pro till it got sick and died. I managed to install Ubuntu 14.04 on my sick computer over Windows wiping it out.
I first installed Linux Mint and downloaded Ubuntu. Somehow I was able to verify checksums or MD5Sums. I think my age is catching up with me and my mind doesn't work like it used to.
How do I find the MD5sum of a downloaded iso file. I've downloaded debian-7.8.0-amd64-DVD-1-3.iso's and both update DVD's as well. I've located the MD5Sum files on the Mirror. Now, how do I compare those numbers/letters with the iso's I've downloaded.
I know I need to run a program to compute the MD5 but can't find it in the menu. I see I need to read man pages and info pages, but can't find them either.
A brain is a terrible thing to waste, but mine needs help.
Thanks,
Stephen
For one user I generated a gpg2 key-pair. I exported these to ascii-armour text files as master.asc and pub.asc. Then took only the pub.asc onto the keyring of a second user on the same partition. I "signed" a simple text file (say trial.txt) with the master key and also transferred it to the home directory of the second user. The pub key on the second user's keyring could verify the signature on the signed text file (trial.txt.gpg) but could not decrypt it. Also, a file encrypted by the second user with the pubkey could be decrypted by the masterkey. Each key therefore has, embedded in its structure, information about child/parent keys. Can anyone thrown light on the actual method of incorporation of this mutual recognition in the key structures? Note:The same kind of recognition happens with sub-keys derived from the Master-key. Can't find any literature which details. Help pl.
Hi,
After upgraded openssl version from 0.9.8zc to 0.9.8zd, how to verify apache is now using the latest openssl version?
Thanks in advance.
Hello! Who can help me? I remenber this problem have never occured when I was using CentOS 6.4. This time I am using Fedora 19 and problem occured as follow.
[ultrabird@PanFu Downloads]$ ls
dnw-linux-v1.01.tar.gz xdnw-0.5.1.tar.gz
[ultrabird@PanFu Downloads]$ mkdir dnw-linux && tar -zxf dnw-linux-v1.01.tar.gz -C dnw-linux
[ultrabird@PanFu Downloads]$ cd dnw-linux/
[ultrabird@PanFu dnw-linux]$ ls
dnw.rules logo.png Makefile README src
[ultrabird@PanFu dnw-linux]$ cd src/driver/
[ultrabird@PanFu driver]$ ls
Makefile secbulk.c
[ultrabird@PanFu driver]$ make -C /lib/modules/`uname -r`/build M=`pwd` modules
make: Entering directory `/usr/src/kernels/3.10.10-200.fc19.i686'
CC [M] /home/ultrabird/Downloads/dnw-linux/src/driver/secbulk.o
/home/ultrabird/Downloads/dnw-linux/src/driver/secbulk.c: In function ‘secbulk_write’:
/home/ultrabird/Downloads/dnw-linux/src/driver/secbulk.c:60:96: warning: comparison of distinct pointer types lacks a cast [enabled by default]
to_write = min(len, BULKOUT_BUFFER_SIZE);
^
Building modules, stage 2.
MODPOST 1 modules
CC /home/ultrabird/Downloads/dnw-linux/src/driver/secbulk.mod.o
LD [M] /home/ultrabird/Downloads/dnw-linux/src/driver/secbulk.ko
make: Leaving directory `/usr/src/kernels/3.10.10-200.fc19.i686'
[ultrabird@PanFu driver]$ ls
Makefile Module.symvers secbulk.ko secbulk.mod.o
modules.order secbulk.c secbulk.mod.c secbulk.o
[ultrabird@PanFu driver]$ sudo insmod ./secbulk.ko
[sudo] password for ultrabird:
[ultrabird@PanFu driver]$ dmesg | grep secbulk
[ 438.172811] secbulk: module verification failed: signature and/or required key missing - tainting kernel
[ 438.174533] secbulk:secbulk loaded
[ 438.174660] usbco registered new interface driver secbulk
[ultrabird@PanFu driver]$ uname -a
Linux PanFu 3.10.10-200.fc19.i686 #1 SMP Thu Aug 29 19:25:53 UTC 2013 i686 i686 i386 GNU/Linux
dnw is a download tool for ARM. Maybe secbulk is it's driver. I don't know much about it. Any help would be appreciated. Thanks!
When I do apt-get update and apt-get upgrade, both times I have to unplug my ethernet cord right after it's done downloading the stuff and right before it finishes saying "reading changelogs" and stuff because maybe a second or three after it finishes reading the changelogs my firewall will be lowered. If I unplug my ethernet cord in time I just reset the iptables and plug my ethernet cord back in. For really small upgrades it will finish downloading and reading changelogs too quick so I'm not sure if my firewall was lowered or not and I have to reinstall. I just want it to pause or wait for 5 seconds or something after the upgrades are downloaded. Is there any way for me to do this?
I am getting Following output after running installation of some packages.
it gives me such error
rpmts_HdrFromFdno: Header V3 RSA/SHA1 Signature, key ID c105b9de: BAD
What causing this ? i have downloaded the latest key from
http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 and check it, the key is fine under my system /etc/pki/rpm-gpg
Configuration files of respo are also fine under /etc/yum.rpos.d/CentOS-Base.repo
Kindly help
Following the instructions on the spotify site to install on ubuntu/debian it says:
# 2. If you want to verify the downloaded packages,
# you will need to add our public key
sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 94558F59
It's a reputable site so I did it and everything works ok.
Would this be a risky action at a less reputable site or is it more risky not to add the public key?
Dear All,
I am trying to install a certificate and then authenticate with LDAP,
but I think I have been lost somewhere in the middle :
In a CentOS 7 system,
First, I would like to make sure that the certificate is installed and used :
Code:
yum install ca-certificates
update-ca-trust enable
cp cacert.pem /etc/pki/ca-trust/source/anchors/
update-ca-trust extract
When I do :
Code:
openssl s_client -showcerts -connect ...:636
Code:
openssl verify cacert.pem
cacert.pem: OK
Code:
openssl version -d
OPENSSLDIR: "/etc/pki/tls"
Solved with :
Quote:
openssl s_client -showcerts -connect ...:636