Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the methods to encrypt Linux data

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly introduces "what are the methods to achieve Linux data encryption". In daily operation, I believe many people have doubts about what are the methods to achieve Linux data encryption. Xiaobian consulted all kinds of materials and sorted out simple and easy to use operation methods. I hope to help you answer the doubts about "what are the methods to achieve Linux data encryption"! Next, please follow the small series to learn together!

Data encryption is a very reliable security measure/precaution and anyone who has personal or important data should encrypt it. The purpose of data encryption is to keep your data safe in case it falls into the wrong hands. While there are decryption methods and techniques that can be used to decrypt any encrypted data, some of it may not be retrievable, or the time and effort involved in decrypting it may convince the decryptor that your data is not worth worrying about. We have a number of tutorials on Howtoforce.com that show you one way to decrypt data. This article describes some of the easiest tools to use to encrypt data for us. To do this, I'll use the example of decrypting removable media drives.

Encryption using compression

You need to quickly encrypt the contents of your pen drive (i.e. USB drive). The easiest solution is to compress them using the 7z compression file format, an open-source program that supports 256-bit encryption using the AES algorithm across platforms.

Encrypted using 7z compression and 256-bit AES.

Use partitions for encryption

Open the utility named "Disks" or "GNOME Disks" and select your pen drive from the list on the left. Then, unmount any mounted partitions of the disk by clicking on the Stop button located directly below the partition view. You can also delete them by pressing the "-" button right next to them if you want.

Use Disks to encrypt.

The next step is to add a new partition by pressing the "+" button. A new window will pop up so you can select the "Encrypted" option from the "Type" option list. Define the size from above, then add the name and strong password. Whenever you try to mount a disk, you will be asked to enter this password.

Encrypted with Seahorse.

The third method I'll cover basically uses the popular GNU PG tool to encrypt whatever data you want on disk. We need to install the following packages first: gpg, seahorse, seahorse-nautilus, seahorse-daemon, and seahorse-contracts(the latter if you're using Elementary OS like me). Encryption depends on the key we need to create first. To do this, open the terminal and enter the following command:

gpg –gen-key

Follow the steps below to select the options shown in the screenshots below.

Encrypt with Seahorse: Step 2

Encrypt with Seahorse: Step 3

Once the key's technical parameters are set, you will be asked to enter some details that will help in the key generation process.

Encrypt with Seahorse: Step 4

Finally, set up a password for gpg to generate the key. Doing something (such as moving the mouse or writing some text) helps generate a valid key.

Encrypt with Seahorse: Step 5

When this is done, you can close the terminal, browse to the removable volume again, and find the files you want to encrypt. After selecting the file, right-click and select Encrypt File option.

Encrypt with Seahorse: Step 6

This opens a new container and lets you choose which key you want to use for encryption. After selecting the key you want, click OK and you're done.

At this point, the study of "What are the ways to achieve Linux data encryption" is over, hoping to solve everyone's doubts. Theory and practice can better match to help everyone learn, go and try it! If you want to continue learning more relevant knowledge, please continue to pay attention to the website, Xiaobian will continue to strive to bring more practical articles for everyone!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report