Most secure linux equivalent to Shadow Defender for live CD-like nonpersistency with no traces left (or traces that are encrypted)

Virtualisation can do reasonably secure nonpersistent drives. Would rather not rely on this alone but also have a host that is nonpersistent too. A live DVD as a host leaves no traces and is physically impossible to permanently infect/own … Continue reading Most secure linux equivalent to Shadow Defender for live CD-like nonpersistency with no traces left (or traces that are encrypted)

Restrict privileged users from accessing certain directories on Linux servers with Grsecurity?

My question is similar to these:

Protect sensitive data from sysadmin prying eyes
Restrict access to a specific directory on Linux

From those, I understand that SELinux could accomplish my goal. But we do not have the r… Continue reading Restrict privileged users from accessing certain directories on Linux servers with Grsecurity?

Do any desktop PC motherboards require hardware token authentication? [on hold]

Scenario: I am assembling a desktop computer. I buy an ASUS XYZ motherboard because it will not run — or, even better, its running state cannot be altered, short of pulling the plug — without hardware token authentication. … Continue reading Do any desktop PC motherboards require hardware token authentication? [on hold]