From c2ffa5a577f4e2e382ced524b6899d96cf890299 Mon Sep 17 00:00:00 2001 From: Gabe Venberg Date: Fri, 27 Oct 2023 10:34:42 -0500 Subject: [PATCH] Spelling, caplitalization, and duplicate word removal. --- content/posts/archInstall.adoc | 19 +++++++++---------- content/posts/capsToCtrl.adoc | 15 ++++++++++----- content/posts/dotfileManagement.adoc | 2 +- 3 files changed, 20 insertions(+), 16 deletions(-) diff --git a/content/posts/archInstall.adoc b/content/posts/archInstall.adoc index bf6d176..34447a2 100644 --- a/content/posts/archInstall.adoc +++ b/content/posts/archInstall.adoc @@ -31,7 +31,7 @@ Full disk encryption will not protect you from anything while you laptop is powe Also, I did am not encrypting the boot partition, and Im not setting up any sort of secure boot. This means that an attacker could hypothetically replace your boot partition or firmware and keylog your password, so if you suspect your computer has been tampered with, *DONT* boot it up. -To reiterate, this setup by itself only protect your data if your powered down machine is stolen. It does not protect you data from being stolen in any scenario where your laptop is powered on after or during tampering. +To reiterate, this setup by itself only protect your data if your powered down machine is stolen. It does not protect you data from being stolen in any scenario where your laptop is powered on during tampering or you log in after it has been tampered with. == Things you should do first @@ -111,11 +111,11 @@ $ timedatectl set-ntp true Create partitions using the tools of your choice. I will be using the following partition map. -an EFI partition of 512M +An EFI partition of 512M -a swap partition with a size equal to your RAM. +A swap partition with a size equal to your RAM. -a btrfs partition containing the rest of the space. +A btrfs partition containing the rest of the space. == Encryption @@ -137,7 +137,7 @@ $ cryptsetup luksFormat /dev/sda2 $ cryptsetup config --label="swap" /dev/sda2 {{}} -now open the newly encrypted partitions +now open the newly encrypted partitions. {{}} $ cryptsetup open /dev/sda2 swap @@ -195,10 +195,10 @@ $ swapon /dev/mapper/swap == installing base system, generating *stab -Install the base packages. Adjust the package list to suit your needs. change intel-ucode to amd-ucode if using an AMD processor. +Install the base packages. Adjust the package list to suit your needs. Change intel-ucode to amd-ucode if using an AMD processor. {{}} -$ pacstrap /mnt linux linux-firmware base base-devel btrfs-progs zsh neovim git stow tmux connman wpa_supplicant openvpn fzf htop rsync tree xdg-user-dirs python tree openssh w3m curl intel-ucode +$ pacstrap /mnt linux linux-firmware base base-devel btrfs-progs zsh neovim git stow tmux networkmanager openvpn fzf htop rsync tree xdg-user-dirs python tree openssh w3m curl intel-ucode {{}} Generate an fstab @@ -285,7 +285,7 @@ Install systemd-boot $ bootctl install {{}} -Create /boot/loader/entries/arch.conf containing: +Create /boot/loader/entries/arch.conf containing: (again, change intel to amd depending on processor.) {{}} title Arch Linux @@ -295,7 +295,7 @@ initrd /initramfs-linux.img options root=/dev/mapper/btrfs rootflags=subvol=/root resume=/dev/mapper/swap {{}} -edit /boot/loader/loader.conf and add: +Edit /boot/loader/loader.conf and add: {{}} default arch.conf @@ -360,4 +360,3 @@ Include = /etc/pacman.d/mirrorlist {{}} Congrats! You now have a barebones, but functional, encrypted arch install! - diff --git a/content/posts/capsToCtrl.adoc b/content/posts/capsToCtrl.adoc index 148e1eb..7221ec4 100644 --- a/content/posts/capsToCtrl.adoc +++ b/content/posts/capsToCtrl.adoc @@ -72,7 +72,7 @@ As such, our keymap patch looks like: keycode 58 = Control Control Control Control Control Control Control Control Control Control Control Control Control Control Control Control {{}} -Now just put it in in '/usr/share/kbd/keymaps/', and set it as your keymap with 'sudo localectl set-keymap [filename without .map extention]'. +Now just put it in '/usr/share/kbd/keymaps/', and set it as your keymap with 'sudo localectl set-keymap [filename without .map extention]'. == Full keymap @@ -95,10 +95,15 @@ Then you can (optionally) re-zip it with 'sudo gzip [filename]' and set it as yo There we go! Our caps lock key is now a second control key! Note that localectl does not seem to propogate our change to X11, unfortuanately. -To do it in X as well, simply run -{{}} -setxkbmap -option ctrl:nocaps +To do this in X as well, create a file in `/etc/X11/xorg.conf.d/`, named something along the lines of `90-keyboard.conf` with the config: +{{}} +Section "InputClass" + Identifier "system-keyboard" + MatchIsKeyboard "on" + Option "XkbOptions" "ctrl:nocaps" +EndSection {{}} -In your .xinitrc. +Some people may suggest `setxkbmap` as a way to do this. +However, unfortuantely, `setxkbmap` tends to be overwritten when a usb input device is plugged in or unplugged, and `xorg.conf.d` is the only persistent way to set it. diff --git a/content/posts/dotfileManagement.adoc b/content/posts/dotfileManagement.adoc index 3d776d9..9430115 100644 --- a/content/posts/dotfileManagement.adoc +++ b/content/posts/dotfileManagement.adoc @@ -119,7 +119,7 @@ This is for you to put any scripts you develop that may be called by/aliased by Stow can be found on pretty much every linux distributions package manager. If for some reason it is not, building from source is... suprisingly easy. -You can find the source http://ftp.gnu.org/gnu/stow/[here], download `stow-latest.tar.gz`, and decompress it with `tar xvf stow-latest.tar.gz`. cd into the the uncompressed folder, and simply run `autoreconf -iv`, `./configure`, and `make`. The binary will be in `./bin/stow` free for you to move it into your `$PATH`. +You can find the source http://ftp.gnu.org/gnu/stow/[here], download `stow-latest.tar.gz`, and decompress it with `tar xvf stow-latest.tar.gz`. cd into the uncompressed folder, and simply run `autoreconf -iv`, `./configure`, and `make`. The binary will be in `./bin/stow` free for you to move it into your `$PATH`. == Conclusion, or something