03-23-2014
How to protect Linux by full disk encryption?
Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server?
So my question is how i can full encrypt linux webserver disk so no one can read disk data even he got physical access to the server? the best way, links? thank you
7 More Discussions You Might Find Interesting
1. News, Links, Events and Announcements
Here is a great news story:
http://story.news.yahoo.com/news?tmpl=story&cid=74&e=9&u=/cmp/13100775 (3 Replies)
Discussion started by: Neo
3 Replies
2. UNIX for Advanced & Expert Users
Please solve the following
NOTICE HTFS:No space on dev hd(1/42) (2 Replies)
Discussion started by: msuheel
2 Replies
3. Linux
one of my servers / was full by 100% i cleard some space, now though i have
enough space on / partition still df is showing disk usage as 100% am not able to create any single txt file ? why so ? (3 Replies)
Discussion started by: bryanabhay
3 Replies
4. UNIX for Advanced & Expert Users
Hi,
I am using Red Hat OS 5.0, is there any way that i can password protect directories. I know i can change permission so that no other user can access the content, but sometimes in my office environment i need to share vnc terminal with other people from my login itself. So i want that if user... (1 Reply)
Discussion started by: sarbjit
1 Replies
5. UNIX for Advanced & Expert Users
I was tryin to copy a large file under /tmp location.
I guess the disk space got full and i got fork error.
Then I tried removing some files but the shell did not let me do anything
bash> rm apache22.tar
bash: fork: Not enough space
bash> pwd
/tmp
bash> vmstat 1
bash: fork: Not... (3 Replies)
Discussion started by: mohtashims
3 Replies
6. Cybersecurity
Hello,
i have around 20 backup files tar.gz with sensitive data. The sizes of these files are from around 200MB to around 20GB
I want to secure these files so no one can read, use its contents. only me
the method of encrypting, password protecting them should be fast, so for example in... (1 Reply)
Discussion started by: postcd
1 Replies
7. Shell Programming and Scripting
i want to create 1 script to monitor 1 particular filesystem out of the diferent filesystems. if disk space of that particular filesystem increases by 80% it sends an alert mail to an email id
---------- Post updated at 04:18 PM ---------- Previous update was at 04:17 PM ----------
no. I am... (1 Reply)
Discussion started by: rakeshhhhhhhh
1 Replies
LEARN ABOUT DEBIAN
pdebuild-user-mode-linux
pdebuild-user-mode-linux(1) pbuilder pdebuild-user-mode-linux(1)
NAME
pdebuild-user-mode-linux - pbuilder-user-mode-linux way of doing debuild
SYNOPSIS
pdebuild-user-mode-linux [pdebuild-user-mode-linux options] -- [pbuilder-user-mode-linux options]
DESCRIPTION
A convenience program for pbuilder-user-mode-linux which invokes pbuilder after obtaining appropriate root privilege in a Debian source
directory. One must be inside the source tree containing the debian directory, in order to make it work.
PDEBUILD OPTIONS
--buildsourceroot [fakeroot]
The command used to gain root privilege for invoking dpkg-buildpackage
--auto-debsign
Invoke debsign at the end of pdebuild process.
--debsign-k [key-id]
Pass -k option to debsign to specify which keyid to sign.
--buildresult [Directory for build results]
The place which build result is stored.
--configfile [Extra config file to use]
The configuration file is used, but not passed on to pbuilder-user-mode-linux.
--debbuildopts [options to pass to dpkg-buildpackage]
The space-delimited list of options are passed to dpkg-buildpackage. This option appends to pbuilder option --debbuildopts and may
also be used to reset the list of options by passing the empty string.
--use-pdebuild-internal
Uses a different implementation of pdebuild, which calls clean and build inside the chroot, using bind-mounts.
pdebuild-internal tries to run debian/rules clean inside the chroot. To achieve the goal, the working directory is passed on inside
the chroot, in the form of bind-mounting and debuild is run.
This option will not protect the working directory and its parent directories from the build scripts.
-- [pbuilder options]
After the -- symbol, an arbitrary number of pbuilder options can be specified. See pbuilder-user-mode-linux.1 for full list of
options.
There is an exception that --buildresult needs to be specified as pdebuild option before the -- to be effective.
FILES
/etc/pbuilderrc
The configuration file for pbuilder-user-mode-linux, used in pdebuild-user-mode-linux.
/usr/share/pbuilder/pbuilderrc
The default configuration file for pbuilder-user-mode-linux, used in pdebuild-user-mode-linux.
${HOME}/.pbuilderrc
Configuration file for pbuilder-user-mode-linux, used in pdebuild-user-mode-linux, overrides what is written in /etc/pbuilderrc
AUTHOR
Initial coding, and main maintenance is done by Junichi Uekawa <dancer@debian.org>.
The homepage is available at http://pbuilder.alioth.debian.org
SEE ALSO
/usr/share/doc/pbuilder/pbuilder-doc.html, pbuilder-user-mode-linux(1), pbuilderrc(5), pbuilder-uml.conf(5)
Debian 2006 May 24 pdebuild-user-mode-linux(1)