GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
PLEASE NOTE: All LQ Rules apply to the General forum. Flame wars, personal attacks, hostility, insults and behavior of that nature will not be tolerated. Differing opinions are one of the things that make this site great, but to benefit from differing opinions the discourse must happen respectfully and thoughtfully... without insult and personal attack. Members who are unable or unwilling to participate in General under those parameters will not be permitted to do so. If you see behavior of this nature please report it.
Does anyone have experience with those h/w encrypted USB flash Drives ? I played with 3 such things lately, namely Kingston Data locker, Transcend Jetflash and the Imation, I have mixed experience with them and Kingston seems to be the only working solution for me, at low cost.
In short, I find the Kingston is extremely strong in the build quality, but extremely slow in the r/w speed, much slower than the advertised 10 and 5MB/S respectively, not suitable for portable apps and boot.
The Jetflash also great in the build quality, r/w speed is acceptable, special is that user can assign 2 partitions public and private, and I successfully installed portable Linux boot on the public partition, and windows files on the private partition with password protection. For unknown reason the private partition suddenly disappeared when I copying files to it, I can't reformat the drive the partition just gone, I don't see it on Windows and Gparted it just vanished !! I can't even start the encrytion app, it said the config file corrupted, how could it be the files are supposed to be hard coded, but I see the autorun.inf corrupted not usable, nor can I delete it.
The Imation is very strange to use, once I created the password, I don't need password again next time I plug it into the same PC before reboot, it works just like a unprotected flash drive !
Anyone can share the experience with such drives, and what is your recommandation for the low cost alternatives ?
I remember reading one or two articles on german magazines about some HW-encripted USB flash drives.
Unluckily I don't have those magazines anymore so I cannot tell you which ones were good and which ones bad, but I remember clearly that just 1 or 2 out of the 10 that they tested really managed to keep your informations safe (at least for a while). Most of them failed already with a SW-hack, some others after slicing the surface of the chips and analyzing their internals.
I would therefore personally recommend you to decouple the whole thing and to rely purely an a SW-encryption solution using a known and very reliable underlying HW-medium (probably Sandisk or whatever you positively experienced in the past?).
I've used the Kingston ones, we are all given them at work for when we need to transer files off someone's laptop that they allowed to fall off the domain. They work just fine for what we use them for, but I've never tried to use any with linux, nor have I ever tried to run anything from them. I personally would never pay the premium to have the hardware encryption myself, I'd rather just use software encryption.