Search results

  • ...hBuilds/blob/master/jo/mail/oauth2tool.sh adaptation of oauth2token] (that employs [https://www.passwordstore.org/ pass]).
    14 KB (2,282 words) - 09:40, 15 September 2021
  • :employs {{ic|pam_fprintd.so}} to setup fingerprint authentication.
    10 KB (1,601 words) - 19:10, 9 September 2021
  • ...from YouTube websites with one's media player of choice. The script below employs {{AUR|fbff-git}}, a lightweight media player also written by the author of
    9 KB (1,564 words) - 13:43, 18 June 2021
  • ...kstation) is a workstation or personal computer without disk drives, which employs network booting to load its operating system from a server.''
    10 KB (1,582 words) - 06:24, 5 October 2021
  • ...}} is used), meaning the latitude and longitude of your location. Redshift employs several routines for obtaining your location. If none of them works (e.g. n
    13 KB (1,949 words) - 14:31, 17 January 2022
  • ...ut a LUKS header and its options for multiple keys. <br>This scenario also employs USB devices for {{ic|/boot}} and key storage, which may be applied to the o ...rypt the boot partition using the GRUB bootloader. <br> This scenario also employs an EFI system partition, which may be applied to the other scenarios.
    58 KB (7,758 words) - 01:51, 30 December 2021
  • Disk encryption employs "block ciphers", which operate on fixed-length blocks of data, e.g. 16 byte
    45 KB (6,146 words) - 14:48, 4 November 2021
  • ...r, periodically negotiating a virtual circuit through the Tor network. Tor employs cryptography in a layered manner (hence the 'onion' analogy), ensuring forw
    48 KB (7,246 words) - 19:13, 17 January 2022