- Enter BIOS with F2 and configure:
- "System Configuration" > "SATA Operation": "AHCI"
- "Secure Boot" > "Secure Boot Enable": "Disabled"
Enter boot menu with F12, and boot the Arch USB medium
import urllib2,re | |
def url_title(url,**kwargs): | |
request = urllib2.Request(url) | |
try: | |
data = urllib2.urlopen(request) | |
except urllib2.HTTPError: | |
data = None | |
except urllib2.URLError: | |
data = None |
from tasks import task1 | |
def get_results(queries): | |
query_procs = task1.delay(queries).get() | |
tasks = [] | |
for query_proc in query_procs: | |
tasks.extend(query_proc.subtasks) | |
while tasks: | |
current_task = tasks.pop(0) |
from nltk.probability import DictionaryProbDist | |
from nltk import NaiveBayesClassifier | |
from nltk import FreqDist, ConditionalFreqDist | |
from nltk import BigramAssocMeasures | |
train_samples = { | |
'I hate you and you are a bad person': 'neg', | |
'I love you and you are a good person': 'pos', | |
'I fail at everything and I want to kill people' : 'neg', | |
'I win at everything and I want to love people' : 'pos', |
from nltk.probability import DictionaryProbDist | |
from nltk import NaiveBayesClassifier | |
from nltk import FreqDist, ConditionalFreqDist | |
from nltk import BigramAssocMeasures | |
train_samples = { | |
'I hate you and you are a bad person': 'neg', | |
'I love you and you are a good person': 'pos', | |
'I fail at everything and I want to kill people' : 'neg', | |
'I win at everything and I want to love people' : 'pos', |
from nltk.probability import DictionaryProbDist, ELEProbDist, FreqDist | |
from nltk import NaiveBayesClassifier | |
from nltk import FreqDist, ConditionalFreqDist | |
from nltk import BigramAssocMeasures | |
from collections import defaultdict | |
train_samples = { | |
'I hate you and you are a bad person': 'neg', | |
'I love you and you are a good person': 'pos', | |
'I fail at everything and I want to kill people' : 'neg', |
This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.
Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.
You will find most of this information pulled from the Arch Wiki and other resources linked thereof.
Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX
with /dev/sdX
or your device as needed.