Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Pre-release Ubuntu 12.10 has partial support for manual LVM and disk encryption

Up
vote
Down

Today, I took another look at a daily build of Ubuntu 12.10 to see how far the coders have come in implementing manual LVM and disk encryption. Here is what I found: read more...
permapage | score:9735 | -finid, September 27, 2012

Does disk encryption really protect your data?

Up
vote
Down

Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it? read more...
permapage | score:9242 | -finid, December 11, 2011

Tutorial: Encryption with EncFS (OpenSUSE 12.2)

Up
vote
Down

EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on OpenSUSE 12.2 to encrypt your data. read more...
permapage | score:8554 | -falko, December 13, 2012

Linux Hard Disk Encryption Tutorial

Up
vote
Down

I carry my Linux powered laptop just about everywhere. How do I protect my private data stored on partition or removable storage media against bare-metal attacks where anyone can get their hands on my laptop or usb pen drive while traveling? read more...
permapage | score:8544 | -nixcraft, October 22, 2012

Disk encryption: This is why you should always use it

Up
vote
Down

And no, it’s not because I have anything to hide, it’s just that personal data should be just that – personal, and private. If you are not authorized (by the owner) to see it, you don’t. read more...
permapage | score:8518 | -finid, June 4, 2013

Tutorial: Set up MySQL Replication with SSL Encryption on CentOS 5.4

Up
vote
Down

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures. read more...
mail this link | permapage | score:8430 | -falko, February 19, 2010

Tutorial: RSA Encryption

Up
vote
Down

Public key encryption and how to use it.
In contrast to the cooperative preparations required for setting up private key encryption, such as secret-sharing and close coordination between sender and receiver, you can act entirely on your own to create and publish two numbers that enable anyone, using the RSA encryption formula, to send a private message to you through a public channel. The message becomes "First Class" e-mail, so to speak, as if sealed in an envelope. Using the two numbers you have published, anyone can scramble a message and send it to you. You are the only one who can unscramble it--not even the sender of the message can decrypt the ciphertext.
read more...
mail this link | permapage | score:7954 | -Ray, March 10, 2003

Tutorial: MySQL database replication with SSL encryption

Up
vote
Down

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures though. read more...
mail this link | permapage | score:7904 | -falko, June 8, 2011

File System Encryption on CentOS 6

Up
vote
Down

CentOS 6 now includes eCryptfs which provides the ability to encrypt data and files on a per-file basis instead of the entire disk as in block encryption. The eCryptfs system sits on top of the current file system to provide the encryption layer, that is why it is known as the pseudo-file system. The file operations which are sent to the underlying file system are intercepted by eCryptfs and encrypted. read more...
permapage | score:7874 | -aweber, January 9, 2012

Manage disk encryption passphrases and key slots

Up
vote
Down

Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a shame because it is one of the most effective safeguards against unauthorized physical access to data stored on a computer.

It can take the form of full disk, or per partition, and may be configured during or after installation. However, the most effective is full disk during installation. When disk encryption is enabled, you will be prompted for a passphrase which will be used to lock or encrypt the disk. read more...
mail this link | permapage | score:7853 | -finid, October 7, 2010

Full disk encryption and LVM configuration in the Ubuntu GUI

Up
vote
Down

Well, it looks like from Ubuntu 12.10, due in late October, Ubiquity will have support for full disk encryption and LVM. The test build that I installed in a virtual machine shows that the implementation is still in the early stages, but it also shows how easy it will be to configure both features when the final release hits the digital shelves. read more...
permapage | score:7757 | -finid, September 6, 2012

Open source backup encryption

Up
vote
Down

Amanda or OpenSSL will encrypt your sensitive data...
There are a couple of good open source tools that will do encryption nicely. Probably the best one is OpenSSL, which supports a wide range of ciphers and is very easy to add into existing backup scripts. Quite simply, the command:
read more...
permapage | score:7619 | -Ray, March 1, 2007

Tutorial: Filesystem Encryption with EncFS (Debian 6/Ubuntu 11.10)

Up
vote
Down

EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on Debian Squeeze/Ubuntu 11.10 to encrypt your data. read more...
permapage | score:7616 | -falko, May 9, 2012

Using file encryption tools on Linux

Up
vote
Down

Bcrypt, Ncrypt, Pad, and GnuPG are discussed in this article.
Most of these tools are command-line only, but they are so simple that even the most CLI-challenged newbie should be able to use them with little effort. All are highly portable, small in size, and have few or no library dependencies.
read more...
permapage | score:7604 | -Ray, February 12, 2007

Fedora full disk encryption

Up
vote
Down

Disk encryption in one of the most overlooked and underused security tools in computing. When most people think about securing a computer or the operating system that powers it, a firewall, anti-virus, and other anti-malware software comes to mind. Those are all good and necessary tools, but they are only concerned with network security. What about physical security? What happens if someone gains unauthorized, physical access to your computer? Even with all the fancy firewall and other network security tools running, If the disk is not encrypted, check mate! Your data is now shared. read more...
mail this link | permapage | score:7521 | -finid, February 4, 2010

PHP Encryption

Up
vote
Down

In this increasingly virtual online world, you have to be careful to protect your data. Get an overview of what it means to encrypt and decrypt information, as well as some practical examples involving passwords and other data, using PHP's built-in functionality. With this information you can make your next PHP project a security success. read more...
permapage | score:7413 | -solrac, July 26, 2006

Smart phone, tablet encryption keys vulnerable

Up
vote
Down

If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, well … think again.

Crypto researchers have demonstrated that those encryption keys can be stolen using techniques that are not that difficult to assemble. read more...
permapage | score:7353 | -finid, March 8, 2012

Gaim Encryption: Simple encryption for IM

Up
vote
Down

Encrypt your online chat sessions...
Gaim is the most popular free instant messaging platform. Available for most Unix operating systems, Mac OS X, and Microsoft Windows, Gaim can connect to most IM networks, including AIM, Yahoo, MSN, and Jabber.

Gaim-Encryption is a Gaim plug-in that enables secure conversations over existing IM networks, and, like Gaim itself, Gaim-Encryption is available for most platforms.
read more...
permapage | score:7185 | -Ray, October 3, 2004

Java: Signing and encryption with Axis2 WS-Security

Up
vote
Down

Get an introduction to the principles of public key cryptography, then see how WS-Security applies them for signing and encrypting SOAP messages using public-private key pairs in combination with secret keys. Includes example code using Axis2 and Rampart. read more...
permapage | score:7113 | -solrac, July 13, 2009

Linux Disk Encryption

Up
vote
Down

Five of the best disk encryption tools for Linux; the packages covered are:
  • loop-AES
  • dm-crypt
  • cryptsetup
  • SD4L
  • TrueCrypt
Many organisations need to encrypt sensitive files but do not have the funds to buy disk encryption software. Fortunately, there is a good selection of open source software available to download at no charge that offers good functionality. There are many different tools that allow for disk encryption.

To provide an insight into the open source software that is available, we have compiled a list of 5 notable disk encryption tools. Hopefully, there will be something of interest here for anyone who wants easy-to-use data encryption and security.
read more...
mail this link | permapage | score:6858 | -Ray, April 10, 2011
More articles...
Buy Large Abstract Art Prints

Recent headlines

Tutorial: Install Debian 7 (testing) with debootstrap from a Grml live Linux

10 basic examples of Linux ps command

Tutorial: Running CS-Cart on Nginx on Debian 7/Ubuntu 13.04

Tutorial: Automatically add a disclaimer to emails with alterMIME (Postfix on Debian 6)

Debian 6, Squid, Kerberos/LDAP authentication, Active Directory integration, Cyfin Reporter

Setup Nginx + php-FPM + apc + MariaDB on Debian: The perfect LEMP server

Virtual Users/Domains with Postfix/Courier/MySQL/SquirrelMail (Debian 7)

PC-BSD 9.1 preview

Stella: RH/CentOS 6.3 based Desktop OS

LinSSID – Graphical wireless scanning for Linux

Upgrade Fedora 18 to 19 With FedUp

Pipelight – Using Silverlight in Linux browsers

Install openQRM 5.1 on Debian 7

LG 8-inch G Pad 8.3 Android tablet

How to install Ajenti on Ubuntu 13.04 server

Tutorial: Debian 7 Samba Server with tdbsam

Linux Mint Debian 201204 MATE/Cinnamon review

Pre-release Ubuntu 12.10 has partial support for manual LVM and disk encryption

Tutorial: Webcam streaming your desktop plus audio with ffmpeg, crtmpserver, Flowplayer

Giada – Audio tool for DJs, live performers and electronic musicians

HowTo: HTTP Status: 206 Partial Content and Range Requests Using Curl

ROSA Desktop Fresh R1: For advanced users, but even better for new users

Nuvola Player: Enjoy all your Cloud music services from one interface

webOS: The latest Linux distribution

Dual-boot Windows 7 and Ubuntu 12.04 on a PC with UEFI board, SSD and HDD

Tahoe Least-Authority File System for secure, distributed data storage

Install Cinnamon on Fedora 19

Unix: Shell Script Wrapper Examples

Hand of Thief trojan and your favorite Linux distribution

I quit using Linux because…

Plasma Media Center 1.1 and digiKam 3.3

OpenShift Online: a non-developer guide

Epoptes – Open source computer lab management and monitoring tool

Ubuntu Edge: Is there life after an unsuccessful crowd-funding campaign?

Sagemath in the Cloud and Sagemath 5.11

Tutorial: Replace Windows with Ubuntu 13.04

ATA over Ethernet (AoE) (Ubuntu 12.04)

Usability, user-friendliness and the Linux desktop

High-resolution text console with uvesafb in Debian/Ubuntu

Linux mail command examples: send mails from command line

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin