Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using Steghide to Hide your Data Crypticly

OpenSUSE

TrueCrypt - Free opensource on the fly Disk Encryption tool

Post date: August 7, 2008, 22:08 Category: Security Views: 3349 Comments
Tutorial quote: TrueCrypt is a free opensource software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Debian

Protect Your Files With TrueCrypt 5.1a On Debian Etch (GNOME)

Post date: May 13, 2008, 10:05 Category: Desktop Views: 3186 Comments
Tutorial quote: This document describes how to set up TrueCrypt 5.1a on Debian Etch (GNOME). Taken from the TrueCrypt page: "TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc)."
Unix+clones

Hide your folders in KDE

Post date: November 11, 2007, 05:11 Category: Desktop Views: 3083 Comments
Tutorial quote: Want to keep your MP3s away from your boss’ or big brother’s view? Of course, in Linux anything that starts with a period is “suppose” to be hidden; but all we have to do is type “ls -A” or turn on the viewing of hidden files in KDE…not too hard. Basically what we can do is set a transparent PNG as our folder icon, and rename our folder with a ” “(space). This will actually keep the previous name of the folder.Also we will keep anyone out of the folder that doesn’t know Linux commands, and doesn’t know exactly where we have placed the icon. This works GREAT for the desktop.
Ubuntu

Anonymous BitTorrent Using ItsHidden VPN

Post date: July 28, 2009, 18:07 Category: Benchmarks Views: 4060 Comments
Tutorial quote: With anti-piracy outfits warning those who share copyrighted content and ISPs threatening to pull the plug on alleged offenders, many file-sharers have decided to protect themselves by going anonymous. To accommodate this growing demand, ItsHidden is now offering a free VPN targeted at those who want to protect their privacy online. Named ItsHidden, the free VPN solution has opened up a BETA test to the public, who can now privatize their Internet traffic - including BitTorrent transfers - in next to no time. ItsHidden was set up with torrent users in mind, allowing them to hide their identities from third parties who choose to snoop on their activities.
OSX

How To Backup Your Mac Intelligently

Post date: May 26, 2006, 07:05 Category: Miscellaneous Views: 6024 Comments
Tutorial quote: I’m a paranoid person when it comes to backing up my files, but it took a hard drive crash of my own to make me realize how important backing up can be. Since then, I’ve gotten very good at making sure my data is secure. The setup I’m about to describe works for me. It’s based on how I prioritize my data and on the budget I’m willing to spend to keep everything safe. It’s not perfect for everyone, so take what I say with a grain of salt - an example of where to start and what’s possible.
Linux

Retrieving XML With cURL And Simple XML

Post date: November 21, 2009, 02:11 Category: Programming Views: 4465 Comments
Tutorial quote: This tutorial explains how to use Curl and SimpleXML SimpleXML is a php5 extension used to parse XML data. Topics covered include loading XML documents, parsing nodes & attributes, and filtering data with XPath statements.
Debian

Gnu Privacy Guard (GPG)

Post date: March 21, 2006, 19:03 Category: Security Views: 2772 Comments
Tutorial quote: GNU Privacy Guard, or GPG, is a free replacement for the famous encryption tool PGP written by Phil Zimmermann. It is a tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. Here we'll provide a quick introduction to generating a key-pair and using it for basic tasks.
Linux

How To Resize ext3 Partitions Without Losing Data

Post date: January 9, 2007, 20:01 Category: System Views: 4801 Comments
Tutorial quote: This article is about resizing ext3 partitions without losing data. It shows how to shrink and enlarge existing ext3 partitions and how to merge two ext3 partitions. This can be quite useful if you do not use LVM and you realize that your existing partitioning does not meet your actual needs anymore.
Linux

Network Monitoring with Zabbix

Post date: March 31, 2006, 21:03 Category: Software Views: 5156 Comments
Tutorial quote: ZABBIX is software that monitors numerous parameters of a network and the health and integrity of servers. ZABBIX uses a flexible notification mechanism that allows users to configure e-mail based alerts for virtually any event. This allows a fast reaction to server problems. ZABBIX offers excellent reporting and data visualisation features based on the stored data. This makes ZABBIX ideal for capacity planning.
Linux

Custom Monitoring MySQL and SNMP with BixData

Post date: February 3, 2007, 00:02 Category: Software Views: 3184 Comments
Tutorial quote: With BixData you can monitor your servers as well as VMware and Xen. BixData includes pre-built plugins for things like CPU, Memory, Disk, etc. but any good monitoring tool needs to be customizable. BixData includes the basic ability to run scripts and record their exit values, similar to Nagios Plugins. BixData 2.7 adds support for importing data in more complex formats. This allows you to monitor almost anything. I'll go through the steps showing you how to monitor MySQL locally where an agent is installed and then the steps to monitor a device remotely through SNMP. The advantage of BixData is that any data available through a BixAgent works with the standard tools such as the situation room, scoreboards, notifications and the reporting system. All data are stored in standard SQL tables and are easily accessible.
Web-based applications and online marketing solutions - LumoLink