|
You are here |
neilzone.co.uk | ||
| | | | |
willhaley.com
|
|
| | | | | Encrypt and Decrypt a Single File on Linux with AES256 and GPG Encrypt gpg --cipher-algo AES256 --symmetric --output encrypted.file plain.file Decrypt gpg --output plain.file --decrypt encrypted.file Change the key file for a LUKS device cryptsetup luksChangeKey /dev/sdX --key-file /keys/old.keyfile /keys/new.keyfile Create a LUKS Encrypted Image Container File Create an empty 1GB img file dd if=/dev/zero of=encrypted.img bs=1 count=0 seek=1G Choose a keyfile that will be used to encrypt and unlock the image. Any regular file works as a key. A random key can be generated like so. | |
| | | | |
shrik3.com
|
|
| | | | | ||
| | | | |
hjr265.me
|
|
| | | | | Let's say you have a computer at home shared by multiple people. And, you want to encrypt your hard drive with LUKS but not have to use the same passphrase. You can do that. LUKS has 8 key slots (LUKS1 does, LUKS2 can support more). When you set up a LUKS encrypted device you are configuring the first key slot only. But by running the following command you can set up an additional passphrase: | |
| | | | |
kiljan.org
|
|
| | | Official documentation only notes how to make a bootable USB medium for either legacy BIOS or UEFI systems. This guide covers how to make a single USB medium that boots on both. In addition, any leftover space on the USB medium can be used to store Clonezilla images. | ||