06-07-2013
Yes in theory I agree with you both.
Lets just say that I am trying to meet compliance so that I can say the drive is encrypted, and get a check in the box.
So if there is a tool which can achieve the type of 'compliance' I am looking for, I would be interested in hearing about it.
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies
2. UNIX for Dummies Questions & Answers
I have a laptop running ubuntu 10.10. In Gparted I see numerous partitions. This was installed 'I believe' using the 'encrypt home folder' option using the install disk. I am trying to determine 'as a matter of fact' since I did not do the install, which partitions are in fact encrypted, and... (0 Replies)
Discussion started by: Marcus Aurelius
0 Replies
3. Linux
Hi All,
In linux server some encryption keys were imported using gpg command.
I want to know when those keys was imported.
Is there any way to get when the encryption keys were imported?
Thanks in advance..
:rolleyes: (1 Reply)
Discussion started by: latika
1 Replies
4. UNIX for Advanced & Expert Users
What is the difference between these yum provides and whatprovides methods? I know provides and whatprovides give the same results, but different methods of */ and \* give different results. Also whether you put */ and \* in front of the string or behind the string give different results. I have... (0 Replies)
Discussion started by: cokedude
0 Replies
5. Ubuntu
we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in
this is to be made by chging source code of linux ...........
can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies
6. Cybersecurity
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies
7. Cybersecurity
Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server?
So my question is how i can full encrypt linux webserver disk so no one can... (1 Reply)
Discussion started by: postcd
1 Replies
8. UNIX for Beginners Questions & Answers
Hi, we have a brand new Centos 6.8 build, and after some discussion it seems that there is some interest in securing the entire system using whole disk encryption.
What is/are the best option/s, and is this something that can be done after Centos is installed (like for example PGP WDE in Windows... (2 Replies)
Discussion started by: xdawg
2 Replies
ECJ(1) General Commands Manual ECJ(1)
NAME
ecj - manual page for eclipse JDT Compiler
SYNOPSIS
ecj <options> <source files>
DESCRIPTION
The JDT Compiler (jdtc) is a command version of Java compiler for eclipse. ecj has basic java compiler options like SUN's javac.
Note: this manual page is out of date; please call the compiler with -help for the current documentation.
OPTIONS
-help display a help message
-version compiler version number
-classpath <dir 1>;<dir 2>;...;<dir P>
-d <dir> destination directory (if omitted no package directory structure is created)
-d none
no classfile is generated
-1.3 set compliance level to 1.3
-1.4 set compliance level to 1.4 (default)
-1.5 set compliance level to 1.5
-1.6 set compliance level to 1.6
-1.7 set compliance level to 1.7
-source <ver> assertions toggle (1.3 or 1.4, default is 1.3 in -1.3 mode and 1.4 in -1.4 mode)
-target <ver> classfile target setting
-nowarn no warning (equivalent to '-warn:none')
-warn: <level> set warning level (e.g. '-warn:unusedLocals,deprecation')
constructorName
warn method with constructor name
packageDefaultMethod
warn attempt to override package-default method
deprecation
warn usage of deprecated type or member
maskedCatchBlocks
warn hidden catch block
unusedLocals
warn on unused local variable (never read)
unusedArguments
warn on unused method argument (never read)
unusedImports
warn on unused imports
syntheticAccess
warn when performing synthetic access for innerclass
assertIdentifier
warn occurrence of 'assert' used as identifier
-deprecation equivalent to -warn:deprecation. -g[:<level>] debug attributes level
-g all debug info ('-g:lines,vars,source')
-g:none
no debug info
-g:[lines,vars,source]
selective debug info
-preserveAllLocals code gen preserve all local variables (for debug purpose)
-noImportError no errors for unresolved imports
-encoding specify default source encoding format (custom encoding can also be specifed on a per file basis by suffixing each
input source file/folder name with '[encoding]')
-log <filename> specify a log file
-proceedOnError keep compiling when error, dumping class files with problem methods
-verbose print accessedprocessed compilation units
-referenceInfo compute reference info
-progress show progress (only in -log mode)
-time display speed information
-noExit do not call System.exit(n) at end of compilation (n=0 if no error)
-repeat <n> repeat compilation process <n> times (perf analysis)
AUTHOR
This manual page was written by Takshi Okamoto and Jan Schulz <debian@katzien.de>.
October 2002 ECJ(1)