This tutorial presents a step-by-step guide on how to configure full disk encryption manually on Ubuntu 13.10 and Linux Mint 16. It will also work for any other Ubuntu-based distribution, like Linux Deepin. The point of setting up encrypted partitions manually is so that you can create more than the two default partitions (root and swap) created by Ubiquity, Ubuntu’s […]
Post Tagged with: "disk encryption"
Disk encryption is one of those physical security features that determine whether I install a Linux distribution on any computer I use for serious computing. Whether it’s a server, notebook, ultrabook or any other type of *book, if it’s not a crash-and-burn unit, the hard disk drive (HDD) has to be encrypted. And no, it’s not because I have anything […]
Ubiquity, Ubuntu Desktop‘s graphical installation program, is very easy to use, very newbie friendly, but it lacks support for full disk encryption, LVM, the Linux Logical Volume Manager, and RAID. On a desktop system, I do not care very much about RAID, but full disk encryption and LVM are must-haves. Well, it looks like from Ubuntu 12.10, due in late […]
ROSA Marathon is a Linux distribution derived from Mandriva Desktop. It is developed by ROSA Labs, a Linux solutions provider based in Moscow, Russia. ROSA Marathon 2012, the latest edition, was released just a few days ago. As a Mandriva-drived distribution, ROSA Marathon retains all the excellent graphical (management) applications of its parent distribution. One of those applications, is the […]
The security features in Fedora make it one of my favorite Linux distributions. And that is partly why it is in my list of the top 6 KDE distributions of 2011, even though it takes some tweaking to get it to the it just works state. I will take the security advantages of an operating system over any user-friendliness weaknesses, […]
Disk encryption is one of several physical security measures that could be used to protect data on your computer from unauthorized physical access. And it is best configured during installation, not after. But once configured, how effective is it? First, let’s see how it is implemented in some popular Linux distributions. In Fedora, for example, all you need to encrypt […]