Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I've never used crypt or mcrypt, and i need to encrypt a .tar file to later decrypt it again. I would appreciate if someone explained me step by step what i have to do. Im interested in using a maximum security algorithm but im pretty ignorant in this topic
it has the howto's and the downloads if you haven't got them yet.
you could write your own small php encryption program it takes only a second to get symetric encryption to work. Have a look at the mcrypt thing in www.php.net
I've read most googleable tutorials, but when it starts talking about generating symmetric keys and upgrading the kernel for random number generation they lose me
Thanks sigsegv for putting it in clear terms. If it would have been so easy to found an example like yours,.. apparently people doesnt feel comfortable with simplicity
Originally posted by Hano Thanks sigsegv for putting it in clear terms. If it would have been so easy to found an example like yours,.. apparently people doesnt feel comfortable with simplicity
I don't feel comfortable with it either. I expect a user to know what they're doing, or at least be able to read/search, which in this case it looks like you have (some). GPG isn't hard software, and the documentation is plentiful, so I really don't know why anyone with basic reading comprehension skills would need help beyond someone telling them GPG is what they're looking for.
Crypto is one of those things ... Just because you know the commands to do something doesn't mean you don't have to know how it works. Not knowing what you're doing and how the software works is an almost definite eventuality of data loss.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.