Librenix
Headlines | Linux | Apps | Coding | BSD | Admin | News
Information for Linux System Administration 

Pre-release Ubuntu 12.10 has partial support for manual LVM and disk encryption

Up
vote
Down

Today, I took another look at a daily build of Ubuntu 12.10 to see how far the coders have come in implementing manual LVM and disk encryption. Here is what I found: read more...
permapage | score:9777 | -finid, September 27, 2012

Does disk encryption really protect your data?

Up
vote
Down

Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it? read more...
permapage | score:9497 | -finid, December 11, 2011

Linux Hard Disk Encryption Tutorial

Up
vote
Down

I carry my Linux powered laptop just about everywhere. How do I protect my private data stored on partition or removable storage media against bare-metal attacks where anyone can get their hands on my laptop or usb pen drive while traveling? read more...
permapage | score:9269 | -nixcraft, October 22, 2012

Tutorial: Encryption with EncFS (OpenSUSE 12.2)

Up
vote
Down

EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on OpenSUSE 12.2 to encrypt your data. read more...
permapage | score:8444 | -falko, December 13, 2012

Tutorial: Set up MySQL Replication with SSL Encryption on CentOS 5.4

Up
vote
Down

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures. read more...
mail this link | permapage | score:8285 | -falko, February 19, 2010

Full disk encryption and LVM configuration in the Ubuntu GUI

Up
vote
Down

Well, it looks like from Ubuntu 12.10, due in late October, Ubiquity will have support for full disk encryption and LVM. The test build that I installed in a virtual machine shows that the implementation is still in the early stages, but it also shows how easy it will be to configure both features when the final release hits the digital shelves. read more...
permapage | score:8257 | -finid, September 6, 2012

Disk encryption: This is why you should always use it

Up
vote
Down

And no, itís not because I have anything to hide, itís just that personal data should be just that Ė personal, and private. If you are not authorized (by the owner) to see it, you donít. read more...
permapage | score:8253 | -finid, June 4, 2013

File System Encryption on CentOS 6

Up
vote
Down

CentOS 6 now includes eCryptfs which provides the ability to encrypt data and files on a per-file basis instead of the entire disk as in block encryption. The eCryptfs system sits on top of the current file system to provide the encryption layer, that is why it is known as the pseudo-file system. The file operations which are sent to the underlying file system are intercepted by eCryptfs and encrypted. read more...
permapage | score:8200 | -aweber, January 9, 2012

Tutorial: MySQL database replication with SSL encryption

Up
vote
Down

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave). MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync. This is not a backup policy because an accidentally issued DELETE command will also be carried out on the slave; but replication can help protect against hardware failures though. read more...
mail this link | permapage | score:7903 | -falko, June 8, 2011

Tutorial: RSA Encryption

Up
vote
Down

Public key encryption and how to use it.
In contrast to the cooperative preparations required for setting up private key encryption, such as secret-sharing and close coordination between sender and receiver, you can act entirely on your own to create and publish two numbers that enable anyone, using the RSA encryption formula, to send a private message to you through a public channel. The message becomes "First Class" e-mail, so to speak, as if sealed in an envelope. Using the two numbers you have published, anyone can scramble a message and send it to you. You are the only one who can unscramble it--not even the sender of the message can decrypt the ciphertext.
read more...
mail this link | permapage | score:7800 | -Ray, March 10, 2003

Manage disk encryption passphrases and key slots

Up
vote
Down

Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a shame because it is one of the most effective safeguards against unauthorized physical access to data stored on a computer.

It can take the form of full disk, or per partition, and may be configured during or after installation. However, the most effective is full disk during installation. When disk encryption is enabled, you will be prompted for a passphrase which will be used to lock or encrypt the disk. read more...
mail this link | permapage | score:7650 | -finid, October 7, 2010

Fedora full disk encryption

Up
vote
Down

Disk encryption in one of the most overlooked and underused security tools in computing. When most people think about securing a computer or the operating system that powers it, a firewall, anti-virus, and other anti-malware software comes to mind. Those are all good and necessary tools, but they are only concerned with network security. What about physical security? What happens if someone gains unauthorized, physical access to your computer? Even with all the fancy firewall and other network security tools running, If the disk is not encrypted, check mate! Your data is now shared. read more...
mail this link | permapage | score:7567 | -finid, February 4, 2010

Open source backup encryption

Up
vote
Down

Amanda or OpenSSL will encrypt your sensitive data...
There are a couple of good open source tools that will do encryption nicely. Probably the best one is OpenSSL, which supports a wide range of ciphers and is very easy to add into existing backup scripts. Quite simply, the command:
read more...
permapage | score:7563 | -Ray, March 1, 2007

Tutorial: Filesystem Encryption with EncFS (Debian 6/Ubuntu 11.10)

Up
vote
Down

EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on Debian Squeeze/Ubuntu 11.10 to encrypt your data. read more...
permapage | score:7439 | -falko, May 9, 2012

PHP Encryption

Up
vote
Down

In this increasingly virtual online world, you have to be careful to protect your data. Get an overview of what it means to encrypt and decrypt information, as well as some practical examples involving passwords and other data, using PHP's built-in functionality. With this information you can make your next PHP project a security success. read more...
permapage | score:7418 | -solrac, July 26, 2006

Linux, BSD distributions supporting disk encryption

Up
vote
Down

Disk encryption is not something most personal computer users think of when they consider ways to boost the security profile of their computer. A firewall? Yes, that in the minds of most is what computer security is all about. However, a firewall is a network security tool, and it is useless if your computer is lost or stolen. That is when disk encryption comes into play. And if you truly care about guarding access to your data, encrypting the hard drive holding it is just as important as a firewall.

So, how does encrypting a hard drive, protect your data? read more...
mail this link | permapage | score:7399 | -finid, July 26, 2011

Using file encryption tools on Linux

Up
vote
Down

Bcrypt, Ncrypt, Pad, and GnuPG are discussed in this article.
Most of these tools are command-line only, but they are so simple that even the most CLI-challenged newbie should be able to use them with little effort. All are highly portable, small in size, and have few or no library dependencies.
read more...
permapage | score:7385 | -Ray, February 12, 2007

Gaim Encryption: Simple encryption for IM

Up
vote
Down

Encrypt your online chat sessions...
Gaim is the most popular free instant messaging platform. Available for most Unix operating systems, Mac OS X, and Microsoft Windows, Gaim can connect to most IM networks, including AIM, Yahoo, MSN, and Jabber.

Gaim-Encryption is a Gaim plug-in that enables secure conversations over existing IM networks, and, like Gaim itself, Gaim-Encryption is available for most platforms.
read more...
permapage | score:7336 | -Ray, October 3, 2004

TrueCrypt: Linux, Windows filesystem encryption

Up
vote
Down

An open source, free, and cross platform encryption program...
TrueCrypt encrypts and decrypts files on the fly, as they are loaded or saved, without user intervention. TrueCrypt can encrypt files and store them in a container file that acts as a virtual disk, or make an entire partitions or disk into an encrypted volume in both Microsoft and Linux. The software depends on a personal password or key that you create when configuring a TrueCrypt volume. Without this key, no data on an encrypted volume can be read (not even offline).
read more...
mail this link | permapage | score:7089 | -Ray, February 15, 2007

Java: Signing and encryption with Axis2 WS-Security

Up
vote
Down

Get an introduction to the principles of public key cryptography, then see how WS-Security applies them for signing and encrypting SOAP messages using public-private key pairs in combination with secret keys. Includes example code using Axis2 and Rampart. read more...
permapage | score:6963 | -solrac, July 13, 2009
More articles...
Beautiful Abstract Art Prints

Selected articles

Mono-culture and the .NETwork effect

Linux dominates Windows

Testing the Digital Ocean $5 Cloud Servers with an MMORPG

Download: Linux 3D Client for Starship Traders

Graffiti Server Download Page

Scripting: A parallel Linux backup script

The Supreme Court is wrong on Copyright Case

No, RMS, Linux is not GNU/Linux

Librenix T-Shirts and Coffee Mugs!

Apple to Intel move no threat to Linux

MiniLesson: An introduction to Linux in ten commands

The short life and hard times of a Linux virus

Space Tyrant: A multiplayer network game for Linux

VPS: Xen vs. OpenVZ

Beneficial Computer Viruses

The Network Computer: An opportunity for Linux

Space Tyrant: A threaded C game project: First Code

The life cycle of a programmer

Linux vs. Windows: Why Linux will win

Space Tyrant: A threaded game server project in C

How to install Ubuntu Linux on the decTOP SFF computer

Missing the point of the Mac Mini

Apple DIY Repair

Shadow.sh: A simple directory shadowing script for Linux

Hacker Haiku

Tutorial: Introduction to Linux files

Space Tyrant: Multithreading lessons learned on SMP hardware

Microsoft to push unlicensed users to Linux

Why software sucks

Why Programmers are not Software Engineers

Closed Source Linux Distribution Launched

Programming Language Tradeoffs: 3GL vs 4GL

The Real Microsoft Monopoly

 

Firefox sidebar

Site map

Site info

News feed

Features

Login
(to post)

Search

 
Articles are owned by their authors.   © 2000-2012 Ray Yeargin