aboutsummaryrefslogtreecommitdiff
path: root/docs/gnulinux
diff options
context:
space:
mode:
Diffstat (limited to 'docs/gnulinux')
-rw-r--r--docs/gnulinux/encrypted_parabola.md4
-rw-r--r--docs/gnulinux/grub_cbfs.md2
-rw-r--r--docs/gnulinux/grub_hardening.md2
3 files changed, 4 insertions, 4 deletions
diff --git a/docs/gnulinux/encrypted_parabola.md b/docs/gnulinux/encrypted_parabola.md
index 5ff070a6..99d5dee7 100644
--- a/docs/gnulinux/encrypted_parabola.md
+++ b/docs/gnulinux/encrypted_parabola.md
@@ -114,7 +114,7 @@ We'll begin by creating a single, large partition on it, and then encrypting it
You will need the `device-mapper` kernel module during the installation;
this will enable us to set up our encrypted disk. To load it, use the following command:
- # modprobe dm-mod
+ # modprobe dm_mod
We then need to select the **device name** of the drive we're installing the operating system on;
see the above method, if needed, for figuring out device names.
@@ -149,7 +149,7 @@ or to find out what options there are, run `man cryptsetup`.
>system. We recommend 500ms (0.5 seconds), and this is included in the
>prepared** `cryptsetup` **command above. Keep in mind that the iteration time
>is for security purposes (it mitigates brute force attacks), so anything lower
->than 5 seconds is probably not very secure.**
+>than 0.5 seconds is probably not very secure.**
You will now be prompted to enter a passphrase; be sure to make it *secure*.
For passphrase security, length is more important than complexity
diff --git a/docs/gnulinux/grub_cbfs.md b/docs/gnulinux/grub_cbfs.md
index 4879d9cf..2e68cb0b 100644
--- a/docs/gnulinux/grub_cbfs.md
+++ b/docs/gnulinux/grub_cbfs.md
@@ -241,7 +241,7 @@ the main storage for **/boot/grub/libreboot\_grub.cfg** or **/grub/libreboot\_gr
Therefore, we need to either copy **libreboot\_grub.cfg** to **/grub**, or to **/boot/grub**:
- $ sudo cp ~/Downloads/libreboot_util/cbfstool/x86_64/grubtest.cfg /boot/grub # or /grub
+ $ sudo cp ~/Downloads/libreboot_util/cbfstool/x86_64/libreboot_grub.cfg /boot/grub # or /grub
Now, the next time we boot our computer, GRUB (in Libreboot) will automatically switch
to this configuration file. *This means that you do not have to re-flash,
diff --git a/docs/gnulinux/grub_hardening.md b/docs/gnulinux/grub_hardening.md
index 9eb7237e..e1329f21 100644
--- a/docs/gnulinux/grub_hardening.md
+++ b/docs/gnulinux/grub_hardening.md
@@ -33,7 +33,7 @@ Helpful links:
- [GRUB manual](https://www.gnu.org/software/grub/manual/html_node/Security.html#Security)
- [GRUB info pages](http://git.savannah.gnu.org/cgit/grub.git/tree/docs/grub.texi)
-- [SATA connected storage considered dangerous.](../../faq.md#firmware-hddssd)
+- [SATA connected storage considered dangerous.](../../faq.md#hddssd-firmware)
- [Coreboot GRUB security howto](https://www.coreboot.org/GRUB2#Security)
GRUB Password