9

Why generate the checksums of module.symbols

view full story
linux-howto

https://bbs.archlinux.org – Mostly interactions between an extraordinarily paranoid Ubuntu user and other non-paranoid Ubuntu users about LUKS being co-opted in some way by a remote attacker when the OP tried to read the logs (which showed the machine receiving IP addresses which the user believed to be part of an attack by strangely named users - actually LAN addresses requested by avahi etc. when the network interface went down). What was striking was the way in which every aspect of the computer's operation was reinterpreted as evidence of a hack - from a refusal to copy to a non-existent destination all the way (HowTos)