Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Howto install the base Linux system onto a USB thumbdrive with the root partition encrypted

FreeBSD

Installing FreeBSD on IBM Netvista S40

Post date: May 8, 2005, 21:05 Category: Installing Views: 3548 Comments
Tutorial quote: In this note we shall talk about installing FreeBSD on a very interesting and elegant machine: IBM Netvista S40. In its creator own terminology, it is "legacy-free". The computer has no parallel, serial, AT keyboard, nor PS/2 mouse ports. No floppy controller either. Instead, it has 5 USB ports (2 frontal and 3 rear) connected to a single USB controller. Besides these USB ports, the system only counts with standard video and audio connectors. The video controller is Intel 82810E SVGA and audio chip is Intel ICH 82801AA, both integrated onboard. The CPU is Intel PIII at 866MHz. The machine is further equipped with a fast Intel Pro PCI network adapter containing a PXE/RIPL boot prom. A quiet 20G Quantum Fireball HDD and a Liteon ATAPI CD-ROM, both connected as masters, constitute the storage subsystem. The case is Flex ATX, a small form factor.
OpenSUSE

TrueCrypt - Free opensource on the fly Disk Encryption tool

Post date: August 7, 2008, 22:08 Category: Security Views: 3373 Comments
Tutorial quote: TrueCrypt is a free opensource software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Gentoo

Using extended attributes to better protect files

Post date: August 18, 2005, 18:08 Category: System Views: 11630 Comments
Tutorial quote: How many times have you accidentally overwritten a configuration file during an etc-update that you had customized? I had been aware of extended attributes for a long while now, but I had never taken the time to actually use them. The extended attribute that I am mostly interested with is the immutable attribute. This attribute, which can only be set by root, prevents a file from be changed or deleted, even by root.
Debian

Protect Your Files With TrueCrypt 5.1a On Debian Etch (GNOME)

Post date: May 13, 2008, 10:05 Category: Desktop Views: 3210 Comments
Tutorial quote: This document describes how to set up TrueCrypt 5.1a on Debian Etch (GNOME). Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)."
Linux

Mastering the Enterprise Volume Management System

Post date: April 13, 2005, 19:04 Category: System Views: 2706 Comments
Tutorial quote: The Enterprise Volume Management System, or EVMS, is a disk, partition, and file system manager for Linux that claims to be a comprehensive tool for all disk management tasks. I ran across EVMS and found the idea appealing, so I decided to try it out. I've been working with it for a couple of weeks now, and this article describes what I found.
Linux+Mint

The Perfect Desktop - Linux Mint Debian 201009

Post date: November 4, 2010, 12:11 Category: Desktop Views: 3415 Comments
Tutorial quote: This tutorial shows how you can set up a Linux Mint Debian 201009 desktop that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge. While the "normal" Linux Mint editions are based on Ubuntu, Linux Mint Debian 201009 is a Linux distribution based on Debian Squeeze (testing); its aim is to look identical to the main edition and to provide the same functionality while using Debian as a base.
Linux

Filesystem Encryption Tools for Linux

Post date: May 28, 2007, 00:05 Category: System Views: 3430 Comments
Tutorial quote: Crypto filesystems keep your data safe – even if someone steals your computer.Linux offers a number of encrypted filesystem options – each with a different approach to the encryption problem.Encrypted filesystems may be overkill
for family photos or your résumé, but they make sense for network-accessible servers that hold sensitive business
documents, databases that contain credit-card information, offline backups, and laptops.
Linux

Back Up Linux And Windows Systems With BackupPC

Post date: January 28, 2007, 21:01 Category: System Views: 4486 Comments
Tutorial quote: This tutorial shows how you can back up Linux and Windows systems with BackupPC. BackupPC acts as a server and is installed on a Linux system, and from there it can connect to all Linux and Windows systems in your local network to back them up and restore them without interfering with the user's work on that system. On the clients minimal to no configuration is needed. BackupPC supports full and incremental backups, and it comes with a neat web frontend for the administrator and normal user so that backups and recoveries can be managed through a web browser. It should be noted, however, that BackupPC does file-based backups, not bit-wise backups like Ghost4Linux, for example, so it is not made for disk/partition imaging.
RedHat

Choosing an I/O Scheduler for Red Hat Enterprise Linux 4

Post date: July 18, 2005, 22:07 Category: Benchmarks Views: 7484 Comments
Tutorial quote: The Linux kernel, the core of the operating system, is responsible for controlling disk access by using kernel I/O scheduling. Red Hat Enterprise Linux 3 with a 2.4 kernel base uses a single, robust, general purpose I/O elevator. The 2.4 I/O scheduler has a reasonable number of tuning options by controlling the amount of time a request remains in an I/O queue before being serviced using the elvtune command. While Red Hat Enterprise Linux 3 offers most workloads excellent performance, it does not always provide the best I/O characteristics for the wide range of applications in use by Linux users these days. The I/O schedulers provided in Red Hat Enterprise Linux 4, embedded in the 2.6 kernel, have advanced the I/O capabilities of Linux significantly. With Red Hat Enterprise Linux 4, applications can now optimize the kernel I/O at boot time, by selecting one of four different I/O schedulers.
Unix+clones

Encrypted NFS with OpenSSH

Post date: May 21, 2005, 19:05 Category: Network Views: 2830 Comments
Tutorial quote: NFS is a widely deployed, mature, and understood protocol that allows computers to share files over a network. The main problems with NFS are that it relies on the inherently insecure UDP protocol, transactions are not encrypted, hosts and users cannot be easily authenticated, and its difficulty in firewalling. This article provides a solution to most of these problems for Linux clients and servers. These principles may also be applied to any UNIX server with ssh installed. This article assumes basic knowledge of NFS and firewalling for Linux.
Web-based applications and online marketing solutions - LumoLink