![]() Registered Member ![]()
|
Hi guys,
Quite by accident, I tested the latest LTS User iso with 7-zip and and there was a warning message saying: "... some data after the end of the payload data". Then I tested the latest User iso and I got the same warning message. What exactly is that "some data"? Best wishes community, Richard P.S. Oh, obviously I've researched the issue and the occurrence is not a bug in 7-zip. That "some data" is genuinely there. It's just that I can't find any explanation for it. Technically, it shouldn't be there, should it?
Proud to be powered by Plasma
|
![]() Registered Member ![]()
|
Oh, if I have checksummed the images? Sure. I'm doing it again right now and copypasting directly from the utility.
neon-userltsedition-20170329-0019-amd64.iso SHA256
neon-useredition-20170323-1018-amd64.iso SHA256
https://files.kde.org/neon/images/neon- ... .sha256sum https://files.kde.org/neon/images/neon- ... .sha256sum I can't see any discrepancies. Can you? The thing is I intend to stick with these images for a while and I wanna be absolutely certain I've got what I bargained for. Thank you guys.
Proud to be powered by Plasma
|
![]() ![]()
|
HINT:
If You want to compare 2 long strings visually, it's easier this way: echo -e "\n…\n…\n" $ echo -e "\nbd21b7801957c7b8332467102dd67cecd2de30c3cfa7b1b3fdfd248ddbd85559\nbd21b7801957c7b8332467102dd67cecd2de30c3cfa7b1b3fdfd248ddbd85559\n" Readable Result: bd21b7801957c7b8332467102dd67cecd2de30c3cfa7b1b3fdfd248ddbd85559 bd21b7801957c7b8332467102dd67cecd2de30c3cfa7b1b3fdfd248ddbd85559 |
![]() ![]()
|
The offical way to check it:
First change into directory. Then: $ ls -l test.txt 1 -rw-rw-r-- 1 *** *** 1 Sep 29 2016 test.txt $ sha256sum test.txt 00e3261a6e0d79c329445acd540fb2b07187a0dcf6017065c8814010283ac67f test.txt # The Check $ echo 00e3261a6e0d79c329445acd540fb2b07187a0dcf6017065c8814010283ac67f test.txt | sha256sum --check test.txt: OK |
![]() Registered Member ![]()
|
Thank you. Much appreciated.
Proud to be powered by Plasma
|
![]() ![]()
|
It even gets better (easier):
$ sha256sum --check <<<"00e3261a6e0d79c329445acd540fb2b07187a0dcf6017065c8814010283ac67f test.txt" test.txt: OK |
![]() Registered Member ![]()
|
Thanks. But say one is on Windows. All that is not applicable on Windows. What I would like to know is how on earth one can run a gpg check on Windows. I'm aware of Cleopatra but somehow I always failed with it. I don't know how to use it. https://www.gpg4win.org/ On a second thought though, never mind. I'm quitting Windows anyways.
Proud to be powered by Plasma
|
![]() Registered Member ![]()
|
@NoName
Better tell me how do I enable the firewall from the terminal and how to check its status, cause I've forgotten it. I don't need any GUI to manage the firewall in Linux. ... and tell an opinion on Quidsup's Notrack software. If unfamiliar with it, check it on GitHub. Thanks.
Proud to be powered by Plasma
|
![]() ![]()
|
On Windows with Kleopatra: $ gpg --print-md SHA256 test.txt test.txt: 00E3261A 6E0D79C3 29445ACD 540FB2B0 7187A0DC F6017065 C8814010 283AC67F is the same as: $ sha256sum test.txt 00e3261a6e0d79c329445acd540fb2b07187a0dcf6017065c8814010283ac67f test.txt
Last edited by NoNameNoBlame on Thu Apr 06, 2017 7:05 pm, edited 1 time in total.
|
![]() ![]()
|
Firewall:
$ man -k 'firewall|ip?tables' fwcheck_psad (8) - look for iptables rules that log and block unwanted packets. fwsnort (8) - Firewall Snort ip6tables-apply (8) - a safer way to update iptables remotely ip6tables-save (8) - dump iptables rules to stdout iptables (8) - administration tool for IPv4/IPv6 packet filtering and NAT iptables-apply (8) - a safer way to update iptables remotely iptables-extensions (8) - list of extensions in the standard iptables distribution iptables-restore (8) - Restore IP Tables iptables-save (8) - dump iptables rules to stdout iptables-xml (1) - Convert iptables-save format to XML ip6tables (8) - administration tool for IPv4/IPv6 packet filtering and NAT IPTables::ChainMgr (3pm) - Perl extension for manipulating iptables and ip6tables poli... IPTables::Parse (3pm) - Perl extension for parsing iptables and ip6tables policies kmsgsd (8) - separates iptables messages from all other kernel messages. nf2csv (1) - iptables to CSV data ufw (8) - program for managing a netfilter firewall xtables-multi (8) - xtables multi-link binary for netfilter's iptables and ip6tables |
![]() ![]()
|
|
![]() ![]()
|
# "Message Digest Hash": The MicroSoft way…. PowerShell:
$ Get-FileHash -Path .\desktop.ini -Algorithm sha256 | Format-List Algorithm : SHA256 Hash : CAFEC240D998E4B6E92AD1329CD417E8E9CBD73157488889FD93A542DE4A4844 Path : C:\Users\***\Documents\desktop.ini |
![]() Registered Member ![]()
|
@NoName
You're clearly very knowledgeable. Thanks a lot.
Proud to be powered by Plasma
|
Registered users: Bing [Bot], Google [Bot], Sogou [Bot]