Tag Archive: Encryption

How to securely backup LUKS-encrypted partitions, incrementally.

These days, security is at the forefront of many computer users’ minds. Running your primary machine with encryption is important to ensure privacy and security. Generally, the most common form of partition level encryption for Linux machines is the LUKS encryption specification which is directly supported by the Linux kernel. Most file level backup applications …

Continue reading »

Public Key Encryption – a depthful explanation for beginners: Part 1

I’ve been asked by various people recently about encryption for secure communications. This is a very complex topic involving very advanced principles. Implementing a method to communicate securely over a digital connection (such as e-mail or live chat) can be very difficult for the average user. Over a series of blog posts, I shall attempt …

Continue reading »

Quick, easy and transportable encryption in Linux

I have tried many types of encryption, and I’ve had issues with them all. For many reasons, some programs make it too complicated to access the data, while others require special software to be made available on the system so that the data could be accessed. Others require that fixed-size containers be used, which can …

Continue reading »

Easily create a private, encrypted folder on any Ubuntu or Debian system.

From the Ubuntu Geek: eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.It provides advanced key management and policy features. eCryptfs stores cryptographic metadata in the header of each file written, so that encrypted files can be copied between hosts; the file will be decryptable with the proper key, and there is no need …

Continue reading »

Encrypting containers (or partitions) with Cryptsetup and LUKS

Source: feraga.com Howto use Cryptsetup with LUKS support. (Debian Linux). This is a short howto to describe the basic usage of Device-Mapper, DM-Crypt, and Cryptsetup to mount and use encrypted partitions and container files. This is partially in response to the recent articles about the numbers of USB flash thumbdrives that are regularly lost. If …

Continue reading »

WPA / WPA2 … as insecure as I expected

Wireless encryption stinks. It always has. Generally, the way I secure my wireless is first to engage MAC filtering (not at all secure, but at least filters out the newbies), then I engage an SSH tunnel to a trusted box @ home with the dynamic application-level port forwarding which allows the SSH server to act …

Continue reading »

Leveraging GPU’s to crack passwords 25 times as faster than with CPU’s.

From the NewScientist Tech section: A technique for cracking computer passwords using inexpensive off-the-shelf computer graphics hardware is causing a stir in the computer security community. Elcomsoft, a software company based in Moscow, Russia, has filed a US patent for the technique. It takes advantage of the “massively parallel processing” capabilities of a graphics processing …

Continue reading »