Sponsored Content
Full Discussion: Linux Encryption methods
Special Forums Cybersecurity Linux Encryption methods Post 302817811 by verdepollo on Thursday 6th of June 2013 01:31:01 PM
Old 06-06-2013
Plus, it's never secure enough:

Image
These 2 Users Gave Thanks to verdepollo For This Post:
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

2. UNIX for Dummies Questions & Answers

What are the best ways to get info on the encryption methods used on my laptop?

I have a laptop running ubuntu 10.10. In Gparted I see numerous partitions. This was installed 'I believe' using the 'encrypt home folder' option using the install disk. I am trying to determine 'as a matter of fact' since I did not do the install, which partitions are in fact encrypted, and... (0 Replies)
Discussion started by: Marcus Aurelius
0 Replies

3. Linux

It is possible to find out when a particular encryption key was imported in linux

Hi All, In linux server some encryption keys were imported using gpg command. I want to know when those keys was imported. Is there any way to get when the encryption keys were imported? Thanks in advance.. :rolleyes: (1 Reply)
Discussion started by: latika
1 Replies

4. UNIX for Advanced & Expert Users

yum provides methods

What is the difference between these yum provides and whatprovides methods? I know provides and whatprovides give the same results, but different methods of */ and \* give different results. Also whether you put */ and \* in front of the string or behind the string give different results. I have... (0 Replies)
Discussion started by: cokedude
0 Replies

5. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

6. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

7. Cybersecurity

How to protect Linux by full disk encryption?

Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server? So my question is how i can full encrypt linux webserver disk so no one can... (1 Reply)
Discussion started by: postcd
1 Replies

8. UNIX for Beginners Questions & Answers

Encryption in Linux?

Hi, we have a brand new Centos 6.8 build, and after some discussion it seems that there is some interest in securing the entire system using whole disk encryption. What is/are the best option/s, and is this something that can be done after Centos is installed (like for example PGP WDE in Windows... (2 Replies)
Discussion started by: xdawg
2 Replies
MP4ART(1)							  MP4v2 Utilities							 MP4ART(1)

NAME
mp4art - manual page for mp4art - MP4v2 2.0.0 SYNOPSIS
mp4art [OPTION]... ACTION file... DESCRIPTION
For each mp4 (m4a) file specified, perform the specified ACTION. An action must be specified. Some options are not applicable for some actions. ACTIONS --list list all covr-boxes --add IMG add covr-box from IMG file --replace IMG replace covr-box with IMG file --remove remove covr-box --extract extract covr-box ACTION PARAMETERS --art-any act on all covr-boxes (default) --art-index IDX act on covr-box index IDX OPTIONS -z, --optimize optimize mp4 file after modification -y, --dryrun do not actually create or modify any files -k, --keepgoing continue batch processing even after errors -o, --overwrite overwrite existing files when creating -f, --force force overwrite even if file is read-only -q, --quiet equivalent to --verbose 0 -d, --debug NUM increase debug or long-option to set NUM -v, --verbose NUM increase verbosity or long-option to set NUM -h, --help print brief help or long-option for extended help --version print version information and exit DEBUG LEVELS (for raw mp4 file I/O) 0 supressed 1 add warnings and errors (default) 2 add table details 3 add implicits 4 everything VERBOSE LEVELS 0 warnings and errors 1 normal informative messages (default) 2 more informative messages 3 everything mp4art - MP4v2 2.0.0 June 2012 MP4ART(1)
All times are GMT -4. The time now is 02:08 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy