Creating secure virtual machine that nobody can see its content including the host machine?

This problem is completely different from “running malware in a VM”! Suppose I want to have a virtual machine running some software with secret data. But I do not have complete control of the host machine, i.e. hackers can happily play on the host machine. Then, is it possible that my VM is still safe? For instance, without knowing the password, the hackers can never see what is inside the VM even though they get control of the host?

(P.S. Maybe by using some kind of full-disk encryption? But what about the memory… And when the VM is executing commands, the host can see that, cannot it?)

Thanks for any ideas!

If I send a plaintext e-mail using Gmail to somebody, including my PGP public key block, is that secure?

I’ve been trying to figure out “practical encryption” (AKA “PGP”) for many years. As far as I can tell, this is not fundamentally flawed:

  1. I know Joe’s e-mail address:
  2. I have a Gmail e-mail address:
  3. I have GPG installed on my PC.
  4. I send a new e-mail to Joe consisting of the “PGP PUBLIC KEY BLOCK” extracted from GPG.
  5. Joe received it and can now encrypt a text using that “PGP PUBLIC KEY BLOCK” of mine, reply to my e-mail, and I can then decrypt it and read his message. Inside this message, Joe has included his own such PGP public key block.
  6. I use Joe’s PGP public key block to reply to his message, and from this point on, we only send the actual messages (no key) encrypted with each other’s keys, which we have stored on our PCs.

Is there anything fundamentally wrong/insecure about this? Some concerns:

  1. By simply operating the e-mail service, Google knows my public key (but not Joe’s, since that is embedded inside the encrypted blob). This doesn’t actually matter, though, does it? They can’t do anything with my public key? The only thing it can be used for is to encrypt text one-way which only I can decrypt, because only I have the private key on my computer?
  2. If they decide to manipulate my initial e-mail message, changing the key I sent to Joe, then Joe’s reply will be unreadable by me, since it’s no longer encrypted using my public key, but Google’s intercepted key. That means Joe and I won’t be having any conversation beyond that initial e-mail from me and the first reply by him (which Google can read), but after that, nothing happens since I can’t read/decrypt his reply?

What benefit does Amazon get from including search results in product URLs? [closed] Above is a link to a product. You can see in the URL what I looked up to find it. As an information conscious person, we know that this benefits Amazon enough to have bothered making the decision. What are the possible benefits, if they’re not already known? What are the risks?

How to create custom search form function including post “tags”

This is my HTML:

<input type="text" class="keyword" name="keyword" id="keyword" placeholder="Search video..."> <button id="search-keyword">Search</button> 

When I click the “Search” button start a script like this:

if($  ('.current').hasClass('search-select')){     action = 'my_create_posts_search'; //php function to do      ab = document.getElementsByClassName('keyword')[0].value; //get the value of input } 

Then an Ajax function starts:

 $  .ajax({     type: "POST",     url: ajax_params.ajax_url, //wordpress ajax     data: {      'action': action, //php function to do        'ab': ab, //value of input }, 

Then the action start and the code excecuted is this:

function my_create_posts_search($  name) {  //Pagination for posts  $  response = '';  $  paged = (int) (!is_null($  _POST['clicked_times'])) ? $  _POST['clicked_times'] : 0;   $  postsPerPage = 18;  $  postOffset = $  paged * $  postsPerPage;   $  args = array(     'posts_per_page'  => $  postsPerPage, //pagination     'offset'          => $  postOffset, //pagination     'category'        => 42, //post category     's'               => $  name, //value of input     'orderby'         => 'date',     'order'           => 'DESC',  );  ... other things... } 

Everything works perfectly expcet when I would like to search by Post Tags.

How can I implement this feature?

I hope my code will help you. Thanks!

Including a specific ‘Home’ link when a sites ‘Home’ is equivalent to another function

I am designing a blog site where the Home page is a list of blog posts.

In this situation is there any research into the validity of using a Home navigation link which takes you to the list of blog posts and not including a Blog navigation item?

I think this would be acceptable as if the user is on the Home page they can see what it contains and if they have navigated to a post, they know Home will take them back to where they came from and hopefully have remembered that Home contains a list of posts. But keen to see if there is any contrary research.

Alternatives I’m considering are to not include a specific Home link and just use Blog (using a logo to return to Home) but I’d be concerned that this doesn’t indicate strongly enough how to go-home unless the logo looks stylistically like a button.

Steve Krug is keen to use the Site ID as a return to Home link, which is fair, but also recommends (but doesn’t insist) on having a Home link in the navigation. I see Facebook do include a home link on the main nav and this links to news feed on the left navigation. Amazon, don’t seem to include a home link anymore.

Or finally to include both a Home and Blog link, but I don’t like the duplication as I think it can cause confusion if a user from the Home page clicks Blog and see’s the same content. Also, I can only indicate one active page, so having two links seems the wrong approach.

Including full paths with overlayfs or unionfs

I have the following directories:

/some/path/dir1/subdir1/* /some/path/dir1/subdir2/* /some/path/dir1/subdir3/* /some/path/dir2/subdir1/* /some/path/dir2/subdir2/* /some/path/dir2/subdir3/* 

I want to create an overlayfs (or similar) mount that merges subdir2 from both dir1 and dir2.

mount overlay -t overlay -o lowerdir=/some/path/dir1/subdir2:/some/path/dir2/subdir2 /newpath 

However, I want to keep their full paths, so that /newpath will contain the following:

/newpath/some/path/dir1/subdir2/* /newpath/some/path/dir2/subdir2/* 

I have not been able to find any information on this online… can this be done? Or is there another tool that could accomplish this for me?

You can make up to 20% from every sold product INCLUDING REBILLS!

Promote Porn Video Uploader on your website and get paid for it!

Get 20.00% commission on every sale you refer! Become a Tube Sites Submitter affiliate today!

Monthly payments
You will get your commissions every month, either transferred to your 2Checkout prepaid debit MasterCard or sent via wire transfer, check or PayPal.

Start selling now!

You can make up to 20% from every sold product INCLUDING REBILLS!

Want to log all user activites performed on ubuntu UI,terminal,Putty,WinSCP including commands executed with timestamp

For security measures, I want a log of all acivites of all users on ubuntu system. Even the activities performed from UI or by externally accessing device through Putty or WinSCP. For ex. if someone logs in through putty or WinSCP and deletes or creates a file then i should have all the information like which user logged in through which IP address and which file did he created or deleted.If it’s a command through terminal, then I want which user executed which command and when.If there doesn’t exist a log of this sort then I want a way to create such a log