Sponsored Content
Operating Systems Linux Ubuntu Obtaining an encrypted notebook/computer and prevent against infiltration Post 302982128 by fractal_bar on Saturday 24th of September 2016 04:08:47 PM
Old 09-24-2016
CPU & Memory Obtaining an encrypted notebook/computer and prevent against infiltration

Hej ––

I'm writing to explore the options on comparisons of commercial notebooks over encrypted notebooks which are offered online in the prevent and general protection against infiltration and 'hacks' and other 'obvious' methods into the system outside of security management techniques which deal with proper file and user management.
  • what are encrypted notebooks;
  • how are encrypted notebooks different then commercial counterparts; and
  • how is the running operating system managed and protected
Always ––
 

9 More Discussions You Might Find Interesting

1. IP Networking

Obtaining IP address

How can UNIX systems obtain IP addresses? Can it obtain from Win 2000 Server, DHCP service, dynamically? (1 Reply)
Discussion started by: Raael
1 Replies

2. UNIX for Advanced & Expert Users

Obtaining A Process ID (PID)

Is there any way I can get UNIX to return the Process ID of a process when I actually issue the command to invoke the process? For example, if I was to launch an emacs process in batch mode, by issuing the UNIX command : % emacs file.txt& then UNIX would return the Process ID (PID).... (7 Replies)
Discussion started by: 1cuervo
7 Replies

3. Programming

Obtaining Process information on AIX

I have written a program to collect some performance metrics on and AIX box, but I'm having difficultly getting the process information. I'm lead to believe that I'm not getting the correct information because I'm trying to run the program on AIX 5.1 (5100-03), but I'm not convinced as the... (0 Replies)
Discussion started by: StuBob
0 Replies

4. What is on Your Mind?

Obtaining Security Clearance

I'm looking to move down to the Baltimore, MD area and have been looking for a job for about a week. Many of the opportunities require some form of security clearance, because many of the jobs are government work. My question is how do I go about obtaining the proper clearance? I'm a U.S.... (6 Replies)
Discussion started by: dangral
6 Replies

5. Shell Programming and Scripting

obtaining a line number in ksh programming

Hi People, how do i obtain the line number of a ksh shell script that i am working on For example in C,when u key in __LINE__ will return u the current line number of the src code. regards wilson (1 Reply)
Discussion started by: wilsontan
1 Replies

6. Shell Programming and Scripting

obtaining a particular day

hello guys am totally new to this script programming so help me i want to write a script that obtain a particular day and schedule a task that day at particular time .. my problem is i don't know to get time and particular day in script ... 2. how i ll print the time taken by executing a... (2 Replies)
Discussion started by: johnray31
2 Replies

7. What is on Your Mind?

Which Notebook to buy

Hi Im not sure that i post that Thread here on the right place but i hope someone can help me. Im searching for a new Notebook with Linux or Unix as system. Im looking for a Notebook with the following components: Intel Core 2 for mobile min 2GB RAM 15 " Display none reflective ATI or NVidia... (6 Replies)
Discussion started by: MagicMike
6 Replies

8. IP Networking

Obtaining IP address from both my network interface

HI folks, I am developing a software which one of the module is to interchange the ip address of another active network interface's when making a socket connection. I would like to know whether there is any function call that would enable me to retrieve the ip address that is obtained by a... (2 Replies)
Discussion started by: citiz3n
2 Replies

9. Shell Programming and Scripting

Obtaining day before a given date

Hi all, is there a way using GNU (Solaris 8) methods of obtaining the day before a given day? i.e. 2007-09-09.... I would like the date a day before it so output would be 2007-09-08. Format YYYY-MM-DD I know I can subtract the day number using cut and expr but it would get tricky if the... (3 Replies)
Discussion started by: muay_tb
3 Replies
ENIGMA(1)						    BSD General Commands Manual 						 ENIGMA(1)

NAME
enigma, crypt -- very simple file encryption SYNOPSIS
enigma [-s] [-k] [password] crypt [-s] [-k] [password] DESCRIPTION
The enigma utility, also known as crypt is a very simple encryption program, working on a ``secret-key'' basis. It operates as a filter, i.e., it encrypts or decrypts a stream of data from standard input, and writes the result to standard output. Since its operation is fully symmetrical, feeding the encrypted data stream again through the engine (using the same secret key) will decrypt it. There are several ways to provide the secret key to the program. By default, the program prompts the user on the controlling terminal for the key, using getpass(3). This is the only safe way of providing it. Alternatively, the key can be provided as the sole command-line argument password when starting the program. Obviously, this way the key can easily be spotted by other users running ps(1). As yet another alternative, enigma can be given the option -k, and it will take the key from the environment variable CrYpTkEy. While this at a first glance seems to be more secure than the previous option, it actually is not since environment variables can also be examined with ps(1). Thus this option is mainly provided for compatibility with other implementations of enigma. When specifying the option -s, enigma modifies the encryption engine in a way that is supposed to make it a little more secure, but incompat- ible with other implementations. Warning The cryptographic value of enigma is rather small. This program is only provided here for compatibility with other operating systems that also provide an implementation (usually called crypt(1) there). For real encryption, refer to bdes(1), openssl(1), pgp(1) (ports/security/pgp), or gpg(1) (ports/security/gnupg). However, restrictions for exporting, importing or using such tools might exist in some countries, so those stronger programs are not being shipped as part of the operating system by default. ENVIRONMENT
CrYpTkEy used to obtain the secret key when option -k has been given EXAMPLES
man enigma | enigma > encrypted Enter key: (XXX -- key not echoed) This will create an encrypted form of this man page, and store it in the file encrypted. enigma XXX < encrypted This displays the previously created file on the terminal. SEE ALSO
bdes(1), gpg(1), openssl(1), pgp(1), ps(1), getpass(3) HISTORY
Implementations of crypt are very common among UNIX operating systems. This implementation has been taken from the Cryptbreakers Workbench which is in the public domain. BSD
May 14, 2004 BSD
All times are GMT -4. The time now is 09:30 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy