czwartek, 28 czerwca 2018

cryptolocking safety ... ???

1) backup

2) backup on another device


3) backup on another one device

4) do not work as Administrator on Windows!
only simple user!

5) install software from trusted place

6) update windows to newest patches

7) use commercial antivir software (avast is shit!)

8) use internal firewall

9) do not connect directly to network with public ip!
use some router?

10) do not walk on web pages which are not nice, like p0rn, gaming, sraming, whatever shit with a lot of java script

11) use always updated web browser aka firefox, chrome, opera whatever but fresh!

12) do not click on web pages which are asking you, if you want to see content, click button with facebók orwhatever

13) BACKUP and never pay for encrypting ass holes!

Restore RedHat 7.5 from kernel panic on encrypted disk after yum update (something went wrong)

Thug corpo life.

I had a problem.

I went to co-workers for help.

Then they asked me for a ticket number for IT support.

Then I fixed it myself...

You will need last kernel rpm package.

Some dirty but working steps.

Something went wrong when I did yum update.
After restart -> kernel panic (looks like broken ramdisk or something ...)

1) get the file from internet named: pld-new-rescue-th2015-1.5-64bit.iso

2) find usb drive device then (but be aware that /dev/sdb can be not what you expect!)
cat pld-new-rescue-th2015-1.5-64bit.iso > /dev/sdb

3) start Lenovo T450 from usb drive and run PLD Linux on it

4) log into rescuecd as root with password pld

5) check disks, probably yours is like my /dev/sda

fdisk -l /dev/sda

expected (yours can be different)
sda1 -> /boot
sda2 -> encrypted by luks


6) open device

cryptsetup luksOpen /dev/sda2  name

7) automagically it will create devices under /dev/mapper directory

vg_whatever_root and others if you have

8) create temp directory for your system

mkdir /AAA

9) mount /dev/mapper/vg_whatever_root /AAA

10) mount /dev/sda1 /AAA/boot

11) for i in dev sys proc ; do mount -o bind /$i /AAA/$i; done

12) chroot /aaa bash

========================================
Probably you are a root on yours encrypted laptop
========================================

13) create a copy of grub.cfg file

cp /boot/grub2/grub.cfg  /boot/grub2/grub.cfg.AAA

14) remove last kernel with --nodeps!

rpm -e kernel --nodeps

15) install again package from rpm file

rpm -ihv kernel-VER.rpm

16) create again grub file

grub2-mkconfig > /boot/grub2/grub.cfg

17) exit from chroot

exit

18) restart and remove usb disk with PLD Linux

19) back again to yours workstation like a boos!