Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Three methods easy data encryption on Linux     - Syncthing: Private Security Synchronization tool to synchronize files between computers / folder (Linux)

- Linux suffered SYN flood attack setting (Linux)

- Linux command ls (Linux)

- error no.2013 lost connection Tom with SQLServer during query (Database)

- xCAT error Unable to dispatch hierarchical sub-command to NORESOLUTION: 3001 (Linux)

- Nodejs mysql pool Example (Programming)

- Zabbix installation and configuration process (Server)

- CentOS 5.8 (64) Python 2.7.5 installation error resolved (Linux)

- Ubuntu GCC, G ++ and fortran Version Switch (Linux)

- Install Websphere MB required system rpm package under Linux (Linux)

- Docker command Detailed (Linux)

- Analyzing Linux server architecture is 32-bit / 64-bit (Server)

- Linux tmux tcpdump summary (Linux)

- Ubuntu uses under KVM + Qemu virtual machine build (Linux)

- To install minimize RHEL / CentOS 7 (Linux)

- How to install MySQL on Linux Dock (Database)

- Spring declarative transaction management (Programming)

- Ubuntu and Derivatives users install the latest KKEdit 0.0.31 (Linux)

- How to install Visual Studio Code on Ubuntu (Linux)

- How to make a U disk to install Ubuntu (Linux)

  Three methods easy data encryption on Linux
  Add Date : 2018-11-21      
  Data encryption is a very reliable safety measures / precautions, people have personal data or important data should be encrypted. Data encryption is the role, if your data fall into the wrong hands, can still ensure data security. While there are some decryption methods and techniques can be used to decrypt any encrypted data, but some of them may not be able to retrieve data, or to decrypt it takes time and effort possible for a cracker finds your data is worth little to worry about. There are a lot of tutorials on our Howtoforge.com, describes a particular method of decrypting data. This article describes several can be the easiest to use tool for us to encrypt data. To this end, I will decrypt the removable media drive as an example.

Use compression encryption

You need to quickly encrypt pen drive (ie USB drives) content. The easiest solution is to use 7z compressed file format to compress them, this open source cross-platform, supports the use of AES 256-bit encryption algorithm.

Use 7z compression and 256-bit AES to encrypt.

Partition to use encryption

Open the utility named "Disks" or "GNOME Disks" choose your pen drive from the list on the left. Then, uninstall any mounted disk partitions, for partitioned view by clicking located just below the "stop" button. If you want, you can also press the right next to it "-" button to remove them.

Disks to use encryption.

The next step is to add a new partition, do this by clicking the "+" button. A new window will pop up, so you can select the "type", "Encrypted" option on the list of options. From the above definition of the size, and then add the names and strong passwords. Whenever you try to mount the disk, you will be asked to enter the password.

Disks used to encrypt

Seahorse use to encrypt

The third approach I will introduce basically use a very popular GNU PG tools, you want to encrypt encrypt any data on the disk. We need to install the following packages: gpg, seahorse, seahorse-nautilus, seahorse-daemon and seahorse-contracts (if you're like me using ElementaryOS, you need the latter). We can not do without the encryption keys need to create, for which open a terminal and enter the following command:

gpg -gen-key

Seahorse use to encrypt

Follow the steps below, select the option to display the following screen shot.

Seahorse to use encryption: Step 2

Seahorse to use encryption: Step 3

Key technical parameters of a good job, it will ask you to enter a few details, they will contribute to the key generation process.

Seahorse is encrypted with Step 4:

Finally, set a password, so gpg generate the key. Operation for some things (such as moving the mouse or write some text), which helps generate qualified key.

Seahorse to use encryption: Step 5

After this is done, you can close the terminal, navigate to the removable volumes again, find those files you want to encrypt. After selecting a file, right click, select "File Encryption" option.

Seahorse to use encryption: Step 6

This will open a new container, so you can choose which want to use the key to encrypt. Select the key you want, click "OK" button, and you're done.
- Iscsi package is installed on RHEL 6.3 x86-64 systems (Linux)
- Flow control message transmission between RAC (Database)
- Visual Studio Code experience (Linux)
- HomeKit Human Interface Guidelines (Linux)
- Linux character device - automatically creates the device nodes and devices (Linux)
- The lambda expression Java8 (constructor references) (Programming)
- Production environment Linux bonding method standby mode slave card switch (Server)
- Intruder tools Knark Analysis and Prevention Linux environment (Linux)
- CentOS 6.5 makes the LAN http source (Linux)
- Large computer network security policy Experience (Linux)
- The file name is garbled or deleted files with special characters under Linux (Linux)
- The headers for the current running kernel were not found when VirtualBox installation enhancements (Linux)
- Detailed installation of CentOS 6.x (Linux)
- Bubble Sort Algorithms (Programming)
- Git Advanced Tutorial (Linux)
- Revive Adserver ad server installation on Ubuntu 15.04 / CentOS7 (Server)
- MySQL master-slave delay problem (Database)
- Linux operating system security settings initial understanding (Linux)
- Install apr support for Tomcat on Linux (Server)
- Java data structures - the linear form of the single-chain applications (Programming)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.