Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Does disk encryption really protect your data?

Up
vote
Down

Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it? read more...
permapage | score:9762 | -finid, December 11, 2011

Pre-release Ubuntu 12.10 has partial support for manual LVM and disk encryption

Up
vote
Down

Today, I took another look at a daily build of Ubuntu 12.10 to see how far the coders have come in implementing manual LVM and disk encryption. Here is what I found: read more...
permapage | score:9171 | -finid, September 27, 2012

Disk encryption: This is why you should always use it

Up
vote
Down

And no, itís not because I have anything to hide, itís just that personal data should be just that Ė personal, and private. If you are not authorized (by the owner) to see it, you donít. read more...
permapage | score:8674 | -finid, June 4, 2013

Tutorial: Set up MySQL Replication with SSL Encryption on CentOS 5.4

Up
vote
Down

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures. read more...
mail this link | permapage | score:8436 | -falko, February 19, 2010

Tutorial: Encryption with EncFS (OpenSUSE 12.2)

Up
vote
Down

EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on OpenSUSE 12.2 to encrypt your data. read more...
permapage | score:8257 | -falko, December 13, 2012

Tutorial: RSA Encryption

Up
vote
Down

Public key encryption and how to use it.
In contrast to the cooperative preparations required for setting up private key encryption, such as secret-sharing and close coordination between sender and receiver, you can act entirely on your own to create and publish two numbers that enable anyone, using the RSA encryption formula, to send a private message to you through a public channel. The message becomes "First Class" e-mail, so to speak, as if sealed in an envelope. Using the two numbers you have published, anyone can scramble a message and send it to you. You are the only one who can unscramble it--not even the sender of the message can decrypt the ciphertext.
read more...
mail this link | permapage | score:8246 | -Ray, March 10, 2003

Open source backup encryption

Up
vote
Down

Amanda or OpenSSL will encrypt your sensitive data...
There are a couple of good open source tools that will do encryption nicely. Probably the best one is OpenSSL, which supports a wide range of ciphers and is very easy to add into existing backup scripts. Quite simply, the command:
read more...
permapage | score:7889 | -Ray, March 1, 2007

Linux Hard Disk Encryption Tutorial

Up
vote
Down

I carry my Linux powered laptop just about everywhere. How do I protect my private data stored on partition or removable storage media against bare-metal attacks where anyone can get their hands on my laptop or usb pen drive while traveling? read more...
permapage | score:7885 | -nixcraft, October 22, 2012

Full disk encryption and LVM configuration in the Ubuntu GUI

Up
vote
Down

Well, it looks like from Ubuntu 12.10, due in late October, Ubiquity will have support for full disk encryption and LVM. The test build that I installed in a virtual machine shows that the implementation is still in the early stages, but it also shows how easy it will be to configure both features when the final release hits the digital shelves. read more...
permapage | score:7816 | -finid, September 6, 2012

Tutorial: MySQL database replication with SSL encryption

Up
vote
Down

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures though. read more...
mail this link | permapage | score:7671 | -falko, June 8, 2011

File System Encryption on CentOS 6

Up
vote
Down

CentOS 6 now includes eCryptfs which provides the ability to encrypt data and files on a per-file basis instead of the entire disk as in block encryption. The eCryptfs system sits on top of the current file system to provide the encryption layer, that is why it is known as the pseudo-file system. The file operations which are sent to the underlying file system are intercepted by eCryptfs and encrypted. read more...
permapage | score:7603 | -aweber, January 9, 2012

Fedora full disk encryption

Up
vote
Down

Disk encryption in one of the most overlooked and underused security tools in computing. When most people think about securing a computer or the operating system that powers it, a firewall, anti-virus, and other anti-malware software comes to mind. Those are all good and necessary tools, but they are only concerned with network security. What about physical security? What happens if someone gains unauthorized, physical access to your computer? Even with all the fancy firewall and other network security tools running, If the disk is not encrypted, check mate! Your data is now shared. read more...
mail this link | permapage | score:7501 | -finid, February 4, 2010

PHP Encryption

Up
vote
Down

In this increasingly virtual online world, you have to be careful to protect your data. Get an overview of what it means to encrypt and decrypt information, as well as some practical examples involving passwords and other data, using PHP's built-in functionality. With this information you can make your next PHP project a security success. read more...
permapage | score:7403 | -solrac, July 26, 2006

Tutorial: Filesystem Encryption with EncFS (Debian 6/Ubuntu 11.10)

Up
vote
Down

EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on Debian Squeeze/Ubuntu 11.10 to encrypt your data. read more...
permapage | score:7383 | -falko, May 9, 2012

Java: Signing and encryption with Axis2 WS-Security

Up
vote
Down

Get an introduction to the principles of public key cryptography, then see how WS-Security applies them for signing and encrypting SOAP messages using public-private key pairs in combination with secret keys. Includes example code using Axis2 and Rampart. read more...
permapage | score:7380 | -solrac, July 13, 2009

Using file encryption tools on Linux

Up
vote
Down

Bcrypt, Ncrypt, Pad, and GnuPG are discussed in this article.
Most of these tools are command-line only, but they are so simple that even the most CLI-challenged newbie should be able to use them with little effort. All are highly portable, small in size, and have few or no library dependencies.
read more...
permapage | score:7222 | -Ray, February 12, 2007

Gaim Encryption: Simple encryption for IM

Up
vote
Down

Encrypt your online chat sessions...
Gaim is the most popular free instant messaging platform. Available for most Unix operating systems, Mac OS X, and Microsoft Windows, Gaim can connect to most IM networks, including AIM, Yahoo, MSN, and Jabber.

Gaim-Encryption is a Gaim plug-in that enables secure conversations over existing IM networks, and, like Gaim itself, Gaim-Encryption is available for most platforms.
read more...
permapage | score:7175 | -Ray, October 3, 2004

LVM and full disk encryption configuration in Ubuntu Ubiquity

Up
vote
Down

Full disk encryption and LVM configuration in Ubuntuís graphical installer showed that two very important features that were missing in Ubiquity, the installation program of Ubuntu Desktop, will finally be incorporated into the version that will ship in Ubuntu 12.10. read more...
permapage | score:7075 | -finid, September 9, 2012

Linux Disk Encryption

Up
vote
Down

Five of the best disk encryption tools for Linux; the packages covered are:
  • loop-AES
  • dm-crypt
  • cryptsetup
  • SD4L
  • TrueCrypt
Many organisations need to encrypt sensitive files but do not have the funds to buy disk encryption software. Fortunately, there is a good selection of open source software available to download at no charge that offers good functionality. There are many different tools that allow for disk encryption.

To provide an insight into the open source software that is available, we have compiled a list of 5 notable disk encryption tools. Hopefully, there will be something of interest here for anyone who wants easy-to-use data encryption and security.
read more...
mail this link | permapage | score:6923 | -Ray, April 10, 2011

TrueCrypt: Linux, Windows filesystem encryption

Up
vote
Down

An open source, free, and cross platform encryption program...
TrueCrypt encrypts and decrypts files on the fly, as they are loaded or saved, without user intervention. TrueCrypt can encrypt files and store them in a container file that acts as a virtual disk, or make an entire partitions or disk into an encrypted volume in both Microsoft and Linux. The software depends on a personal password or key that you create when configuring a TrueCrypt volume. Without this key, no data on an encrypted volume can be read (not even offline).
read more...
mail this link | permapage | score:6456 | -Ray, February 15, 2007
More articles...
Buy Art Online with Satisfaction Guaranteed

Selected articles

Currency Traders Telnet Game

Closed Source Linux Distribution Launched

Programming Language Tradeoffs: 3GL vs 4GL

Linux vs. Windows: Why Linux will win

Shadow.sh: A simple directory shadowing script for Linux

Apple to Intel move no threat to Linux

The Supreme Court is wrong on Copyright Case

VPS: Xen vs. OpenVZ

The Real Microsoft Monopoly

No, RMS, Linux is not GNU/Linux

Hacker Haiku

Tutorial: Introduction to Linux files

Space Tyrant: A multiplayer network game for Linux

Space Tyrant: Multithreading lessons learned on SMP hardware

Graffiti Server Download Page

Why Programmers are not Software Engineers

The Network Computer: An opportunity for Linux

MiniLesson: An introduction to Linux in ten commands

The short life and hard times of a Linux virus

Why software sucks

Space Tyrant: A threaded game server project in C

Download: Linux 3D Client for Starship Traders

Beneficial Computer Viruses

Missing the point of the Mac Mini

The life cycle of a programmer

Librenix T-Shirts and Coffee Mugs!

Space Tyrant: A threaded C game project: First Code

Mono-culture and the .NETwork effect

How to install Ubuntu Linux on the decTOP SFF computer

Linux dominates Windows

Scripting: A parallel Linux backup script

Apple DIY Repair

Microsoft to push unlicensed users to Linux

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin