Sponsored Content
Special Forums Cybersecurity How to protect Linux by full disk encryption? Post 302894046 by postcd on Sunday 23rd of March 2014 10:23:12 AM
Old 03-23-2014
How to protect Linux by full disk encryption?

Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server?

So my question is how i can full encrypt linux webserver disk so no one can read disk data even he got physical access to the server? the best way, links? thank you
 

7 More Discussions You Might Find Interesting

1. News, Links, Events and Announcements

Microsoft Is Using Linux To Protect Its Own Web Site

Here is a great news story: http://story.news.yahoo.com/news?tmpl=story&cid=74&e=9&u=/cmp/13100775 (3 Replies)
Discussion started by: Neo
3 Replies

2. UNIX for Advanced & Expert Users

disk full

Please solve the following NOTICE HTFS:No space on dev hd(1/42) (2 Replies)
Discussion started by: msuheel
2 Replies

3. Linux

Disk full 100%

one of my servers / was full by 100% i cleard some space, now though i have enough space on / partition still df is showing disk usage as 100% am not able to create any single txt file ? why so ? (3 Replies)
Discussion started by: bryanabhay
3 Replies

4. UNIX for Advanced & Expert Users

Is it possible to password protect directories in linux?

Hi, I am using Red Hat OS 5.0, is there any way that i can password protect directories. I know i can change permission so that no other user can access the content, but sometimes in my office environment i need to share vnc terminal with other people from my login itself. So i want that if user... (1 Reply)
Discussion started by: sarbjit
1 Replies

5. UNIX for Advanced & Expert Users

Disk Space full

I was tryin to copy a large file under /tmp location. I guess the disk space got full and i got fork error. Then I tried removing some files but the shell did not let me do anything bash> rm apache22.tar bash: fork: Not enough space bash> pwd /tmp bash> vmstat 1 bash: fork: Not... (3 Replies)
Discussion started by: mohtashims
3 Replies

6. Cybersecurity

How to encrypt / password protect big Linux file?

Hello, i have around 20 backup files tar.gz with sensitive data. The sizes of these files are from around 200MB to around 20GB I want to secure these files so no one can read, use its contents. only me the method of encrypting, password protecting them should be fast, so for example in... (1 Reply)
Discussion started by: postcd
1 Replies

7. Shell Programming and Scripting

Disk full alerts

i want to create 1 script to monitor 1 particular filesystem out of the diferent filesystems. if disk space of that particular filesystem increases by 80% it sends an alert mail to an email id ---------- Post updated at 04:18 PM ---------- Previous update was at 04:17 PM ---------- no. I am... (1 Reply)
Discussion started by: rakeshhhhhhhh
1 Replies
pdebuild-user-mode-linux(1)					     pbuilder					       pdebuild-user-mode-linux(1)

NAME
pdebuild-user-mode-linux - pbuilder-user-mode-linux way of doing debuild SYNOPSIS
pdebuild-user-mode-linux [pdebuild-user-mode-linux options] -- [pbuilder-user-mode-linux options] DESCRIPTION
A convenience program for pbuilder-user-mode-linux which invokes pbuilder after obtaining appropriate root privilege in a Debian source directory. One must be inside the source tree containing the debian directory, in order to make it work. PDEBUILD OPTIONS
--buildsourceroot [fakeroot] The command used to gain root privilege for invoking dpkg-buildpackage --auto-debsign Invoke debsign at the end of pdebuild process. --debsign-k [key-id] Pass -k option to debsign to specify which keyid to sign. --buildresult [Directory for build results] The place which build result is stored. --configfile [Extra config file to use] The configuration file is used, but not passed on to pbuilder-user-mode-linux. --debbuildopts [options to pass to dpkg-buildpackage] The space-delimited list of options are passed to dpkg-buildpackage. This option appends to pbuilder option --debbuildopts and may also be used to reset the list of options by passing the empty string. --use-pdebuild-internal Uses a different implementation of pdebuild, which calls clean and build inside the chroot, using bind-mounts. pdebuild-internal tries to run debian/rules clean inside the chroot. To achieve the goal, the working directory is passed on inside the chroot, in the form of bind-mounting and debuild is run. This option will not protect the working directory and its parent directories from the build scripts. -- [pbuilder options] After the -- symbol, an arbitrary number of pbuilder options can be specified. See pbuilder-user-mode-linux.1 for full list of options. There is an exception that --buildresult needs to be specified as pdebuild option before the -- to be effective. FILES
/etc/pbuilderrc The configuration file for pbuilder-user-mode-linux, used in pdebuild-user-mode-linux. /usr/share/pbuilder/pbuilderrc The default configuration file for pbuilder-user-mode-linux, used in pdebuild-user-mode-linux. ${HOME}/.pbuilderrc Configuration file for pbuilder-user-mode-linux, used in pdebuild-user-mode-linux, overrides what is written in /etc/pbuilderrc AUTHOR
Initial coding, and main maintenance is done by Junichi Uekawa <dancer@debian.org>. The homepage is available at http://pbuilder.alioth.debian.org SEE ALSO
/usr/share/doc/pbuilder/pbuilder-doc.html, pbuilder-user-mode-linux(1), pbuilderrc(5), pbuilder-uml.conf(5) Debian 2006 May 24 pdebuild-user-mode-linux(1)
All times are GMT -4. The time now is 02:22 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy