All honour goes to http://www.blaicher.com/2013/01/accessing-an-encrypted-full-disc-image-lukslvm/
So I typically use a full disc encryption with LVM over LUKS. So assume you have got an image from your harddisk via
dd if=/dev/sda of=image.img
| function Find-Exact-FileWithProgress { | |
| param ( | |
| [string] $BasePath, | |
| [string] $FileName | |
| ) | |
| $files = Get-ChildItem -Path $BasePath -Recurse -File -ErrorAction SilentlyContinue | |
| $total = $files.Count | |
| $counter = 0 |
| #!/bin/bash | |
| LABEL="OVERLAY_ROOT" | |
| FSTYPE="ext4" | |
| # Find all devices with the label | |
| DEVICES=($(blkid | grep "LABEL=\"$LABEL\"" | cut -d: -f1)) | |
| COUNT=${#DEVICES[@]} |
| @echo off | |
| cls | |
| echo ======================================== | |
| echo DNS Flush Utility - Windows | |
| echo ======================================== | |
| echo. | |
| set /p userinput=Do you want to flush the DNS cache now? (y/n): | |
| if /i "%userinput%"=="y" ( | |
| echo. |
| # do sha256asum for each file | |
| # find . -type f ! -name "*.sha256sum" -exec bash -c 'for f; do echo "Processing: $f"; (cd "$(dirname "$f")" && sha256sum "$(basename "$f")" > "$(basename "$f").sha256sum"); done' _ {} + | |
| # find . -type f ! -name "*.sha256sum" -exec sh -c 'for f; do echo "Processing: $f"; (cd "$(dirname "$f")" && sha256sum "$(basename "$f")" > "$(basename "$f").sha256sum"); done' _ {} + | |
| # if you want to skip existing | |
| #find . -type f ! -name "*.sha256sum" -exec sh -c 'for f; do if [ -f "$f.sha256sum" ]; then echo "Skipping (already exists): $f.sha256sum"; else echo "Processing: $f"; (cd "$(dirname "$f")" && sha256sum "$(basename "$f")" > "$(basename "$f").sha256sum"); fi; done' _ {} + | |
| # check each file sha256sum is match | |
| # find . -type f -name "*.sha256sum" -exec sh -c 'cd "$(dirname "{}")" && sha256sum -c "$(basename "{}")"' \; |
| FROM ubuntu:18.04 | |
| ENV DEBIAN_FRONTEND=noninteractive | |
| # Install core dependencies | |
| RUN apt-get update && apt-get install -y \ | |
| curl \ | |
| bash \ | |
| grep \ |
| echo "Usb power status:" | |
| echo "" | |
| sudo cat /sys/bus/usb/devices/*/power/level | |
| echo "" | |
| echo "" | |
| while true; do | |
| read -p "Do you wish to change usb power status? " yn | |
| case $yn in | |
| [Yy]* ) make install; break;; |
| sudo apt update | |
| sudo apt-get install tigervnc-scraping-server | |
| mkdir -p ~/.vnc | |
| vncpasswd | |
| x0vncserver -passwordfile ~/.vnc/passwd -display :0 | |
All honour goes to http://www.blaicher.com/2013/01/accessing-an-encrypted-full-disc-image-lukslvm/
So I typically use a full disc encryption with LVM over LUKS. So assume you have got an image from your harddisk via
dd if=/dev/sda of=image.img