Related articles| wiki.archlinux.org
Related articles| wiki.archlinux.org
Related articles| wiki.archlinux.org
Earlier this month, Joanna Rutkowska implemented the “evil maid” attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption, including PGP Disk and BitLocker. Basically, the attack works like this: Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down. Step 2: You boot your computer using the attacker’s hacked bootloader, entering your...| Schneier on Security
Arch Linux Downloads| archlinux.org
Related articles| wiki.archlinux.org
This document is a guide for installing Arch Linux using the live system booted from an installation medium made from an official installation image. The installation medium provides accessibility features which are described on the page Install Arch Linux with accessibility options. For alternative means of installation, see Category:Installation process.| wiki.archlinux.org
Related articles| wiki.archlinux.org
A unified kernel image (UKI) is a single executable which can be booted directly from UEFI firmware, or automatically sourced by boot loaders with little or no configuration. It is the combination of a UEFI boot stub program like systemd-stub(7), a Linux kernel image, an initrd, and further resources in a single UEFI PE file.| wiki.archlinux.org
Related articles| wiki.archlinux.org