First download the TrueCrypt, copy to the U disk, and then run TrueCrypt.exe.
1. Create a file encryption volume
2, choose a U disk, name a file name, such as "virtual disk _ do not delete"
3, encryption algorithm, select the default AES can
4, enter the total size of the disk image file you need to create.
5, fill in the encryption volume password, you need to use this password to open the virtual disk.
6, the format of the encryption volume
7
mount the volume, here choose the second way I will mount the volume-only on Linux, click the Next button and the interface shown in 2.19 is displayed.Figure 2.19 Volume Format(15) Now to format the previously created volume, click the Format button and the interface shown in 2.20 will be displayed.Figure 2.20 Formatting Process(16) This interface displays information such as the progress, speed, and time of the formatting. When the process finishes
1. FSlint-FSlint can effectively help the system avoid the troubles of deleting duplicate files, empty folders, and some other types of junk files.
2. TestDisk-it is a file recovery and Repair Tool. Ext4 is not currently supported. You can use it to restore important data and files on your disk.
3. TrueCrypt-it is a free and open-source encryption software that supports Windows Vista, 7/XP, Mac OS X, Linux,
creating a new volume is again similar to that of TrueCrypt: A wizard is provided to guide you through the entire process and related options are provided in each step. FreeOTFE has a range of more options that involve the volume's random data string (salt) and hash length, password, key, and disk sector systems, but for most users, use the default option. Some options are mainly provided for backward compatibility, such as the obsolete MD2 and MD4 h
(manually modifying ports to turn on the firewall) and synchronizing only the required servers via scripting http://chenhao6.blog.51cto.com/6228054/1322579
INOTIFY+RSYNC+MUTT+MSMTP implement a Linux file or directory to automatically update and implement e-mail to the administrator http://chenhao6.blog.51cto.com/6228054/1298375
2. Network ServicesThere are many kinds of services, each company will use a different, but the basic services must
Original address: 78059331Beginner's articleLinux OPS Common tool topology see:1rsync ToolsRsync tools are often used in many places to implement synchronization effects on several servers. Our company is using this tool to complete the server game service side and client synchronization, there are several examples of articles:
Rsync Hardening Technology (manually modifying ports to turn on the firewall) and synchronizing only the required servers via scripting
http://chenhao6.blog
Linux, there are several tools to choose from. In this tutorial, I intend to introduce one of these: Ecryptfs, a user-space File system encryption tool. A summary of the encryption tools available on Linux is provided below for your reference.
File system level Encryption
EncFS: One of the easiest ways to try encryption. ENCFS works on a fuse-based pseudo file system, so you just need to create an encryp
10 cross-platform applications that can run on Windows, OSX, Linux, or more systems-general Linux technology-Linux technology and application information. For more information, see the following. Source: lifehacker
Are your important program data in different systems? Each use requires a download process. In fact, you don't need to copy them. You can do it with t
the simplest ways to try encryption. ENCFS works on a fuse-based pseudo-file system, so you just need to create an encrypted folder and mount it to a folder to work.Ecryptfs: A POSIX-compatible encrypting File System, ECRYPTFS works the same way as ENCFS, so you have to mount it.Disk-level encryptionLoop-aes: The oldest method of disk encryption. It's really fast and works for legacy systems (e.g., 2.0 kernel branches).Dmcrypt: The most common disk encryption scheme that supports the modern
Linux services)It is important for Linux users. Disabling unnecessary services can make Linux run more efficiently, but not all Linux services can be disabled. After installing centos Linux today, we found that many services were started when
Linux-(2) Basic file operations in Linux, linux-linux
In linux, everything is files, directories are files, and hardware is files. Therefore, basic file operations are especially important.
1. List the contents of the directory:
Ls
Parameters:
-A: displays all files (includ
Logout Exit SystemGedit Text Editor ToolsUname–r View kernel version information, uname–a more detailsCat/proc/cpuinfo viewing CPUsCat/proc/meminfo Viewing memoryHostname Viewing host namesIfconfig eth0 view eth0 IP AddressAlias ls= ' ls–ll ' setting aliasesTo view the path of the current terminal: TTYView current Shell:echo $SHELLAll Shell:cat/etc/shells under the current systemView CentOS System hostname Format: Echo $PS 1Distinguish internal or external commands: Type CDWhich find the locatio
.
As we all know,linux system everything is a file, so each process has its file descriptor, The Nginx process writes its own file descriptor to the Nginx.pid, and we need to tell Nginx to reopen a new log file (the configuration details of the log file can be seen here, simply by letting the log record what. So we need this directive:kill -USR1 `cat ${pid_path}`This instruction means: first cat to Nginx PID, is an integer, and then send the signal
Becoming a Senior Programmer proficient in Linux programming has always been the goal of many friends. According to statistics from chinacache, the monthly salary of Linux programmers in Beijing is 1.8 times that of Windows programmers, 2.6 times that of Java programmers, and 2.9 times that of Windows programmers. At the same time, the data shows that with the increase of work experience, the income gap bet
This series of articles summarizes Linux network stacks, including:(1) Linux Network protocol Stack Summary(2) Network multipart offload technology Gso/tso/ufo/lro/gro in non-virtualized Linux environment(3) QEMU/KVM Network multipart offload technology in virtualized Linux environment Gso/tso/ufo/lro/gro1.
1, what is Linux?
To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify ( Change), package distribution (distribute), sales, but can not add any restrictions at the time of distribution, and all the original code must be public, so anyone
as follows: 1) VI mytask.sh Enter the following command Date>>/home/mydate3 Cp/home/mydate3/root 2) Grant mytask.sh Execute permission chmod 744 MYTASK.S H 3) Crontab-e 4) Re-enter the command: * * * * * */root/mytask.sh. (3) How to terminate a task crontab-r means to terminate a task schedule. After the command is executed, the tasks in the crontab-e are removed. CRONTAB-L indicates which task schedules are currently in the list.2, the Linux proces
After this period of time to learn, I also have a certain understanding of Linux, today this blog on the previous knowledge of a summary it.The previous Linux learning blog, from the top down is learning in-depth process, my blog link is as follows:First: Analysis of the Linux operating system how the computer starts and how it operatesChapter Two: Analysis of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.