소스 검색

Better description

Bob Mottram 11 년 전
부모
커밋
c638c9eb3f
1개의 변경된 파일1개의 추가작업 그리고 1개의 파일을 삭제
  1. 1
    1
      beaglebone.txt

+ 1
- 1
beaglebone.txt 파일 보기

161
 Not knowing who you're really connecting to is especially true for self-signed certificates, so it is in principle possible that when logging into a site with a username and password a system such as [[http://arstechnica.com/tech-policy/2013/11/uk-spies-continue-quantum-insert-attack-via-linkedin-slashdot-pages/][Quantum Insert]], or a compromised [[http://en.wikipedia.org/wiki/Domain_Name_System][DNS service]], could be used to direct the user to a fake copy of the login screen for the purposes of obtaining their login details.  While this doesn't seem to be a major problem at the time of writing it's something to keep in mind.  So if you can't log in or if you log in and what you see doesn't look like your site then it's possible that such a compromise could have taken place.  Using a password manager with different login details for each site is one way to ensure that if one system is compromised then the attacker can't necessarily get access to all your other stuff.
161
 Not knowing who you're really connecting to is especially true for self-signed certificates, so it is in principle possible that when logging into a site with a username and password a system such as [[http://arstechnica.com/tech-policy/2013/11/uk-spies-continue-quantum-insert-attack-via-linkedin-slashdot-pages/][Quantum Insert]], or a compromised [[http://en.wikipedia.org/wiki/Domain_Name_System][DNS service]], could be used to direct the user to a fake copy of the login screen for the purposes of obtaining their login details.  While this doesn't seem to be a major problem at the time of writing it's something to keep in mind.  So if you can't log in or if you log in and what you see doesn't look like your site then it's possible that such a compromise could have taken place.  Using a password manager with different login details for each site is one way to ensure that if one system is compromised then the attacker can't necessarily get access to all your other stuff.
162
 ** Initial
162
 ** Initial
163
 
163
 
164
-Plug the microSD card into the BBB and Connect the USB cable to your laptop/desktop, then login via ssh.
164
+Eject the microSD card from your computer and plug it into the BBB, then connect the USB cable between the two.  You may need to wait for a couple of minutes for the BBB to boot from the card, then you can then open a terminal and login via ssh.
165
 
165
 
166
 #+BEGIN_SRC: bash
166
 #+BEGIN_SRC: bash
167
 ssh debian@192.168.7.2
167
 ssh debian@192.168.7.2