Sammlung von Links zu dem leidigen Thema. Wer darf eine Kopie des Personalausweises verlangen? Was darf/muss man schwärzen?

Verwaltungsgericht Hannover, Urteil vom 28.11.2013, Aktenzeichen: 10 A 5342/11: Einscannen und Speichern von Personalausweisen unzulässig

datenschutzbeauftragter-info.de, 17.02.2016, Wann ist das Kopieren des Personalausweises erlaubt?

Bundesministerium des Innern, Bürgerservice, eMail vom 24.03.2016: Kopieren von Personalausweisen

CHIP, 09.01.2017, Personalausweis kopieren - das müssen Sie beachten

heise online 13.01.2017: Unerlaubte Ausweiskopien – niemanden kümmert’s

Fall Licht- Serien- Name Anschrift Geburts- Staatsan- Gültigkeits- Zugangs- Unter- persönliche Datum, Kopie Speichern Quelle
  bild nummer Name   daten gehörigkeit dauer nummer schrift Merkmale Behörde      
Auskunftsersuchen ok ok ok ok       ja nein BfDI
Autovermieter nein nein c’t
Banken ok ok ok ok ok ok ok ok ok ok ok ja ja c’t, GwG
Fitness-Studio nein nein c’t
Führerschein-Behörden ok ok ok ok ok ok ok ok ok ok ok ja ja c’t
Telekommunikations-Anbieter ok ok ok ok ok ok ok ok ok ok ok ja ja c’t, TKG

Packages I need to install for using LaTeX:

sudo apt-get install texlive texlive-latex-extra # TeX Live

sudo apt-get install texlive-lang-german         # German (`Package babel Error: Unknown option `ngerman'.`)

sudo apt-get install texlive-bibtex-extra biber  # Bibliography

sudo apt-get install texstudio                   # IDE

Remark for Debian 8 Jessie: texlive-latex-extra is part of texlive and therefore doesn’t need to be installed. (Installing it anyway makes apt mark it as “installed manually”. This can be undone with apt-mark auto texlive-latex-extra.)

If you use Jedox’ drill through capabilities to a H2 database you might want to look inside the database file. Think of renamed cubes: They lose drill through capability until the the table in the drill through database is renamed accordingly. Unfortunately Jedox does not support and thus does not document this at all.

Given the cube load advanced settings “Drill through mode” = “Persisted” the database can be found here:

$ ll /opt/jedox/ps/tomcat/webapps/etlserver/data/db/etl_drillthrough/
total 34,816,159,744
drwxrwxr-x 2 jedoxweb jedoxweb          4,096 Mar 21 12:05 .
drwxr-xr-x 7 jedoxweb jedoxweb          4,096 Mar 21 11:57 ..
-rw-r--r-- 1 jedoxweb jedoxweb 34,782,119,936 Mar 21 12:05 drill.h2.db
-rw-r--r-- 1 jedoxweb jedoxweb         18,869 Mar 21 11:27 drill.trace.db

Locate and start the H2 console on the Jedox server:

$ sudo find /opt/jedox/ps -type f -name h2*jar
/opt/jedox/ps/tomcat/webapps/etlserver/WEB-INF/lib/h2-1.3.176.jar

$ java -jar /opt/jedox/ps/tomcat/webapps/etlserver/WEB-INF/lib/h2-1.3.176.jar
Failed to start a browser to open the URL http://123.123.123.123:8082: Browser detection failed and system property h2.browser not set

Of course we have no browser installed on the system. Instead, from our local machine we create a SSH tunnel to the Jedox server with ssh -L 8082:127.0.0.1:8082 username@servername and open the H2 Console with the URL http://127.0.0.1:8082/ in our local machine’s web browser. The JDBC URL to connect to the database is jdbc:h2:/opt/jedox/ps/tomcat/webapps/etlserver/data/db/etl_drillthrough/drill.

The database belongs to jedoxweb:jedoxweb and has permissions 644 (rw-r--r--) set but we come as a different user. Therefore the database is read only in the H2 Console. In order to get write permission we change the database’s permissions to 666 (rw-rw-rw-). Undo this after altering the database.

What a nice little thing the ASUS Zenbook UX305F Notebook PC is. Except for one flaw: It comes with a proprietary OS. I tried to install a free OS as easy as possiple to support.

Get Ubuntu

Download the desktop version of Ubuntu 15.10 (Wily Werewolf).

Create a bootable USB thumb drive e. g. with Rufus.

Insert the thumb drive, start the Zenbook and press ESC until you can select the USB flash memory as boot device. Choose between trying or installing Ubuntu.

Save the state

Maybe I want to resell the device later. So I want to preserve the condition of delivery. First I leverage the Live Linux (without installing) to backup the internal harddrive.

The internal harddisk is /sda:

ubuntu@ubuntu:~$ lsblk
NAME   MAJ:MIN RM   SIZE RO TYPE MOUNTPOINT
sda      8:0    0 238.5G  0 disk 
+-sda1   8:1    0   100M  0 part 
+-sda2   8:2    0   128M  0 part 
+-sda3   8:3    0  95.4G  0 part 
+-sda4   8:4    0 127.9G  0 part 
+-sda5   8:5    0    15G  0 part 
sdb      8:16   1   1.9G  0 disk 
+-sdb1   8:17   1   1.9G  0 part /cdrom
sdc      8:32   0 931.5G  0 disk 
+-sdc1   8:33   0 931.5G  0 part /media/ubuntu/Iomega HDD
loop0    7:0    0   1.1G  1 loop /rofs

I copy the whole internal harddrive to an external harddrive:

ubuntu@ubuntu:~$ sudo dd bs=16M if=/dev/sda | bzip2 > '/media/ubuntu/Iomega HDD/Asus_UX305FA-FB003H_SSD256GB_image_20151106.img.bz2'
15262+1 records in
15262+1 records out
256060514304 bytes (256 GB) copied, 6769.49 s, 37.8 MB/s

Two hours later:

ubuntu@ubuntu:~$ ls -l '/media/ubuntu/Iomega HDD/Asus_UX305FA-FB003H_SSD256GB_image_20151106.img.bz2'
-rwxrwxrwx 1 ubuntu ubuntu 10838462320 Nov  6 22:44 /media/ubuntu/Iomega HDD/Asus_UX305FA-FB003H_SSD256GB_image_20151106.img.bz2

Install Ubuntu

Start the Zenbook and press ESC until you can select the USB flash memory as boot device. Choose installing Ubuntu.

Text entry settings -> add input source

Install…

Wipe Disk (=delete Windows partitions); LVM

Continue in UEFI mode

Real name; computer name; user name and password; encrypt

Configure SSH

see https://help.ubuntu.com/community/SSH/OpenSSH/Keys

Zenbook:

sudo apt-get install openssh-server
sudo gedit /etc/ssh/sshd_config

Edit sshd_config:

PermitRootLogin no
AuthorizedKeysFile    /etc/ssh/%u/authorized_keys
PasswordAuthentication no
UsePAM no

Bash again

sudo mkdir /etc/ssh/$USER
sudo mv $HOME/.ssh/authorized_keys /etc/ssh/$USER/
sudo chmod 755 /etc/ssh/$USER
chmod 644 /etc/ssh/$USER/authorized_keys
ln -s /etc/ssh/$USER/authorized_keys $HOME/.ssh/

Second computer:

ssh-copy-id -i ~/.ssh/id_rsa.pub username@computername

Configure colored bash prompt

see https://wiki.archlinux.de/title/Bash-Prompt_anpassen

In ~/.bashrc uncomment

force_color_prompt=yes

and change

PS1='${debian_chroot:+($debian_chroot)}\[\033[01;32m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ '

(where the \033[01;32m\] stands for a light green)

to

PS1='${debian_chroot:+($debian_chroot)}\[\033[00;31m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ '

(where the \033[00;31m\] stands for red).

Configure backlight

The backlight keys Fn+F5/Fn+F6 do not work. I use a work around:

Control the backlight with xbacklight (https://wiki.archlinux.org/index.php/Backlight):

sudo apt-get xbacklight utility
xbacklight -inc 10  # increase brightness by 10%

xbacklight -dec 10  # decrease brightness by 10%

Bind to keys:

sudo apt-get install xbindkeys xbindkeys-config 
xbindkeys --defaults > $HOME/.xbindkeysrc

While Fn+F5/Fn+F6 do not work, there is a bearable alternative with the Win+F5/Win+F6 keys. I don’t know why editing .xbindkeysrc does not succeed, but xbindkeys-config is constructive:

#decrease brightness by 10%
"xbacklight -dec 10"
    m:0x40 + c:71
    Mod4 + F5

#increase brightness by 10%
"xbacklight -inc 10"
    m:0x40 + c:72
    Mod4 + F6

Unattended Security Updates

http://spin.atomicobject.com/2014/08/04/debian-ubuntu-security-updates/

https://www.howtoforge.com/how-to-configure-automatic-updates-on-debian-squeeze

unattended-upgrades is installed by default. Just do

dpkg-reconfigure unattended-upgrades

Now, if you leave this unconfigured you might end with a trashstrewn /boot partition. apt needs enough space in /boot and will otherwise only throw errors. Avoid this by editing /etc/apt/apt.conf.d/50unattended-upgrades:

// Do automatic removal of new unused dependencies after the upgrade
// (equivalent to apt-get autoremove)
Unattended-Upgrade::Remove-Unused-Dependencies "true";

This is also the place to have more than just security updates:

// Automatically upgrade packages from these (origin:archive) pairs
Unattended-Upgrade::Allowed-Origins {
        "${distro_id}:${distro_codename}-security";
        "${distro_id}:${distro_codename}-updates";
//      "${distro_id}:${distro_codename}-proposed";
//      "${distro_id}:${distro_codename}-backports";
};

More at help.ubuntu.com.

See results after an unattended upgrade in log files:

cat /var/log/unattended-upgrades/unattended-upgrades*.log

Deactivate privacy leak

see https://fixubuntu.com/

Install Unity Tweak Tool:

sudo apt-get install unity-tweak-tool

Uncheck Search online sources and Show "More Suggestions" for every single user.

TeamViewer

https://www.teamviewer.com/de/download/linux.aspx

https://www.teamviewer.com/de/help/363-Wie-installiere-ich-TeamViewer-auf-meiner-Linux-Distribution.aspx

How to add an user

sudo adduser --encrypt-home username

Hide administrator account from login

Edit /var/lib/AccountsService/users/<username> from

SystemAccount=false

to

SystemAccount=true

Download Raspbian and check hash

Copy image to SD card with dd.

Boot Raspberry Pi with LAN access.

Try SSH to Raspberry Pi: ssh pi@raspberrypi password raspberry

If not successfull find IP with help of router interface or scan network for open SSH port: nmap -p22 192.168.1.0/24. Now SSH to Raspberry Pi: ssh pi@<ip address> password raspberry


For wi-fi edit /etc/wpa_supplicant/wpa_supplicant.conf:

network={
  ssid="SSID"
  psk="PASSPHRASE"
  id_str="DESCRIPTION"
}

Shutdown, disconnect LAN, insert Wi-Pi dongle, boot, try to SSH to pi@raspberrypi or find new IP.


Basic config: sudo raspi-config

Update: sudo apt-get update && sudo apt-get upgrade

Remote desktop: sudo apt-get install xrdp. Connect with rdesktop -u pi -g 1400x960 -k de raspberrypi &.