09-24-2016
Obtaining an encrypted notebook/computer and prevent against infiltration
Hej ––
I'm writing to explore the options on comparisons of commercial notebooks over encrypted notebooks which are offered online in the prevent and general protection against infiltration and 'hacks' and other 'obvious' methods into the system outside of security management techniques which deal with proper file and user management.
- what are encrypted notebooks;
- how are encrypted notebooks different then commercial counterparts; and
- how is the running operating system managed and protected
Always ––
9 More Discussions You Might Find Interesting
1. IP Networking
How can UNIX systems obtain IP addresses? Can it obtain from Win 2000 Server, DHCP service, dynamically? (1 Reply)
Discussion started by: Raael
1 Replies
2. UNIX for Advanced & Expert Users
Is there any way I can get UNIX to return the Process ID of a process when I actually issue the command to invoke the process?
For example, if I was to launch an emacs process in batch mode, by issuing the UNIX command :
% emacs file.txt&
then UNIX would return the Process ID (PID).... (7 Replies)
Discussion started by: 1cuervo
7 Replies
3. Programming
I have written a program to collect some performance metrics on and AIX box, but I'm having difficultly getting the process information.
I'm lead to believe that I'm not getting the correct information because I'm trying to run the program on AIX 5.1 (5100-03), but I'm not convinced as the... (0 Replies)
Discussion started by: StuBob
0 Replies
4. What is on Your Mind?
I'm looking to move down to the Baltimore, MD area and have been looking for a job for about a week. Many of the opportunities require some form of security clearance, because many of the jobs are government work.
My question is how do I go about obtaining the proper clearance? I'm a U.S.... (6 Replies)
Discussion started by: dangral
6 Replies
5. Shell Programming and Scripting
Hi People,
how do i obtain the line number of a ksh shell script that i am working on For example in C,when u key in __LINE__ will return u the current line number of the src code.
regards
wilson (1 Reply)
Discussion started by: wilsontan
1 Replies
6. Shell Programming and Scripting
hello guys am totally new to this script programming so help me
i want to write a script that obtain a particular day and schedule a task that day at particular time .. my problem is i don't know to get time and particular day in script ...
2.
how i ll print the time taken by executing a... (2 Replies)
Discussion started by: johnray31
2 Replies
7. What is on Your Mind?
Hi Im not sure that i post that Thread here on the right place but i hope someone can help me.
Im searching for a new Notebook with Linux or Unix as system.
Im looking for a Notebook with the following components:
Intel Core 2 for mobile
min 2GB RAM
15 " Display none reflective
ATI or NVidia... (6 Replies)
Discussion started by: MagicMike
6 Replies
8. IP Networking
HI folks,
I am developing a software which one of the module is to interchange the ip address of another active network interface's when making a socket connection.
I would like to know whether there is any function call that would enable me to retrieve the ip address that is obtained by a... (2 Replies)
Discussion started by: citiz3n
2 Replies
9. Shell Programming and Scripting
Hi all,
is there a way using GNU (Solaris 8) methods of obtaining the day before a given day?
i.e. 2007-09-09.... I would like the date a day before it so output would be 2007-09-08. Format YYYY-MM-DD
I know I can subtract the day number using cut and expr but it would get tricky if the... (3 Replies)
Discussion started by: muay_tb
3 Replies
LEARN ABOUT FREEBSD
crypt
ENIGMA(1) BSD General Commands Manual ENIGMA(1)
NAME
enigma, crypt -- very simple file encryption
SYNOPSIS
enigma [-s] [-k] [password]
crypt [-s] [-k] [password]
DESCRIPTION
The enigma utility, also known as crypt is a very simple encryption program, working on a ``secret-key'' basis. It operates as a filter,
i.e., it encrypts or decrypts a stream of data from standard input, and writes the result to standard output. Since its operation is fully
symmetrical, feeding the encrypted data stream again through the engine (using the same secret key) will decrypt it.
There are several ways to provide the secret key to the program. By default, the program prompts the user on the controlling terminal for
the key, using getpass(3). This is the only safe way of providing it.
Alternatively, the key can be provided as the sole command-line argument password when starting the program. Obviously, this way the key can
easily be spotted by other users running ps(1). As yet another alternative, enigma can be given the option -k, and it will take the key from
the environment variable CrYpTkEy. While this at a first glance seems to be more secure than the previous option, it actually is not since
environment variables can also be examined with ps(1). Thus this option is mainly provided for compatibility with other implementations of
enigma.
When specifying the option -s, enigma modifies the encryption engine in a way that is supposed to make it a little more secure, but incompat-
ible with other implementations.
Warning
The cryptographic value of enigma is rather small. This program is only provided here for compatibility with other operating systems that
also provide an implementation (usually called crypt(1) there). For real encryption, refer to bdes(1), openssl(1), pgp(1)
(ports/security/pgp), or gpg(1) (ports/security/gnupg). However, restrictions for exporting, importing or using such tools might exist in
some countries, so those stronger programs are not being shipped as part of the operating system by default.
ENVIRONMENT
CrYpTkEy used to obtain the secret key when option -k has been given
EXAMPLES
man enigma | enigma > encrypted
Enter key: (XXX -- key not echoed)
This will create an encrypted form of this man page, and store it in the file encrypted.
enigma XXX < encrypted
This displays the previously created file on the terminal.
SEE ALSO
bdes(1), gpg(1), openssl(1), pgp(1), ps(1), getpass(3)
HISTORY
Implementations of crypt are very common among UNIX operating systems. This implementation has been taken from the Cryptbreakers Workbench
which is in the public domain.
BSD
May 14, 2004 BSD