Sponsored Content
Full Discussion: Encryption in Linux?
Top Forums UNIX for Beginners Questions & Answers Encryption in Linux? Post 302991187 by gandolf989 on Tuesday 7th of February 2017 01:58:46 PM
Old 02-07-2017
I have a personal laptop running Ubuntu 16.04 that has an encrypted volume. In addition to that you can change the ssh port to something other than 22. I use a number well over 1,000. You can try port knocking, I haven't tried this yet, I just know its possible. You can also turn off passwords and require public/private key based cert logins. Not to mention close ports and turn off daemons that you are not going to use.

I think disk based encryption is great for laptops. But if this is a server and your server room is secure, you should not need this. What happens when there is an unplanned outage and the person/people with the encryption password are not available? Are you going to write the password on a sticky note on the server??? ;-)
This User Gave Thanks to gandolf989 For This Post:
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

encryption is possible??

NEED expertise help for this topic!!! Question 1: Is encryption possible for the shell scriping programing? shadow the scriping file, do think is impossible... Question2: built a simple program with the simplicity function that allow user change settings by enter corret name and... (3 Replies)
Discussion started by: trynew
3 Replies

2. UNIX for Dummies Questions & Answers

File encryption/Key encryption ????

My dilemma, I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Discussion started by: hugow
1 Replies

3. Linux

It is possible to find out when a particular encryption key was imported in linux

Hi All, In linux server some encryption keys were imported using gpg command. I want to know when those keys was imported. Is there any way to get when the encryption keys were imported? Thanks in advance.. :rolleyes: (1 Reply)
Discussion started by: latika
1 Replies

4. Ubuntu

help regarding encryption and decryption of files on linux

we are to develope a project on linux whose aim is to automatically encrypt files after logoff and to decrypt them using password after log in this is to be made by chging source code of linux ........... can any one help me on this???? (1 Reply)
Discussion started by: vyom
1 Replies

5. Cybersecurity

Linux Encryption methods

Hi all, I am looking to encrypt a filesystem with a CentOS 6.4 install. However I note that when using LUKS the system does not boot without prompting for the password encryption key. I am looking for an drive/filesystem encryption solution which will allow reboots and shutdown/starts of the... (4 Replies)
Discussion started by: landossa
4 Replies

6. Cybersecurity

File encryption tools with MAC address as an encryption key

Hi all, I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS. For example: when A wants to send file to B A will encrypt the file with B's computer MAC/IP address as an encryption key This file can only be decrypted... (2 Replies)
Discussion started by: sergionicosta
2 Replies

7. Cybersecurity

How to protect Linux by full disk encryption?

Hello, you may know that linux root password can be resetted (example from rescue mode), so this means linux server offers no protection against access of data when you get somehow remote or physical access to server? So my question is how i can full encrypt linux webserver disk so no one can... (1 Reply)
Discussion started by: postcd
1 Replies

8. Shell Programming and Scripting

Data Encryption

Using awk or sed command how can i encrypt the characters for a particular column.For every character it should replace the third charter of alphabets.Example replace "A" with "C" and "B" with "D"..like this it should replace for all characters in particular column. Using below command i am able... (3 Replies)
Discussion started by: katakamvivek
3 Replies

9. AIX

Tape Encryption

Hi guys: I've been trying to find information about how to encrypt a backup to tape (I'm using a couple of simple commands: tar, find | backup), I didn't find a real example of how to do that, just a couple of white papers and information about the methods that use the backup,... (5 Replies)
Discussion started by: AixExplorer
5 Replies
BRANDELF(1)						    BSD General Commands Manual 					       BRANDELF(1)

NAME
brandelf -- mark an ELF binary for a specific ABI SYNOPSIS
brandelf [-lv] [-f ELF_ABI_number] [-t string] file ... DESCRIPTION
The brandelf utility marks an ELF binary to be run under a certain ABI for FreeBSD. The options are as follows: -f ELF_ABI_number Forces branding with the supplied ELF ABI number. Incompatible with the -t option. These values are assigned by SCO/USL. -l Writes the list of all known ELF types to the standard error. -v Turns on verbose output. -t string Brands the given ELF binaries to be of the string ABI type. Currently supported ABIs are ``FreeBSD'', ``Linux'', and ``SVR4''. file If -t string is given it will brand file to be of type string, otherwise it will simply display the branding of file. EXIT STATUS
Exit status is 0 on success, and 1 if the command fails if a file does not exist, is too short, fails to brand properly, or the brand requested is not one of the known types and the -f option is not set. EXAMPLES
The following is an example of a typical usage of the brandelf command: brandelf file brandelf -t Linux file SEE ALSO
The Santa Cruz Operation, Inc., System V Application Binary Interface, http://www.sco.com/developer/devspecs/, April 29, 1998 (DRAFT). HISTORY
The brandelf manual page first appeared in FreeBSD 2.2. AUTHORS
This manual page was written by John-Mark Gurney <jmg@FreeBSD.org>. BSD
March 25, 2014 BSD
All times are GMT -4. The time now is 11:04 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy