In software encryption protection technology, a common protection method is license authorization based on hardware fingerprint. This article will introduce the specific hardware fingerprint acquisition technology in detail and provide a demo source code program.
Hardware fingerprint encryption means that after a user obtains and installs the software for free, the software obtains some hardware informatio
2017-08-06 10-59-35.png "alt=" Wkiol1mgklghf3knaabavx4vpf4011.png "/>3. Automatic mount encryption device on bootVim/etc/crypttab Edit profile Settings auto-decrypt on bootDecrypt name device holds encrypted password fileWestos/dev/vdb2/root/lukspsfileVim/root/lukspsfile password for input partition encryptionchmod 600/root/lukspsfile to execute permissionsFocus: Cryptsetup luksaddkey/dev/vdb2/root/lukspsfile allow device and partition password to st
Do you know that you can turn an ordinary u disk into a USB u disk? The USB u disk will give us a higher security protection for data security. Here is a simple introduction to the general U disk into an encryption U disk.
1. Her
35 years ago, u disk is also more than hundred yuan, 35 years later, mobile hard disk has already "cabbage" price. In this regard, when we repeatedly replaced the storage equipment, will leave a lot of idle products, especially some small volume u disk, the use of little but discard pity, so how to make use of idle resources? Today, I recommend a fast U
You can find the Linux-based disk encryption program TrueCrypt-general Linux technology-Linux technology and application information. The following is a detailed description. TrueCrypt is a disk encryption software that supports Linux and Windows (Mac OS X will be supported in the future) systems. Its main functions in
Small knitting here to share with you about the file fast encryption compression backup to the U disk tips, u disk is our common tool to copy files, easy to carry, in peacetime work, we often need to back up some important files to the U disk, but also afraid of others to borrow U
Function GetVolumeInformation Lib "kernel32 "_Alias "GetVolumeInformationA" (ByVal lpRootPathName As String ,_ByVal pVolumeNameBuffer As String, ByVal nVolumeNameSize As Long ,_LpVolumeSerialNumber As Long, lpMaximumComponentLength As Long ,_LpFileSystemFlags As Long, ByVal lpFileSystemNameBuffer As String ,_ByVal nFileSystemNameSize As Long)Private Const MAX_FILENAME_LEN = 256Public Function DriveSerial (ByVal sDrv As String) As Long'Usage:'Dim ds As Long'Ds = DriveSerial ("C ")Dim RetVal As
Http://www.truecrypt.org/docs/
Download:
Http://files.cnblogs.com/wucg/TrueCryptSetup7.1a.zip
Http://www.truecrypt.org/downloads
Introduction
The documentation is not guaranteed to contain no errors and is provided without warranty of any kind. For more information, please see disclause.
Truecrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device ). on-the-fly encryption means that da
Because of the lightweight and convenient disk, easy to carry, now more and more people use, but also because it is convenient to carry to our data security brought trouble, imagine, when you leave the computer when others use a U disk to the computer important data are copied, if it is important confidential, this can be a big trouble. Is there any way to allow others to use U
Because of the lightweight USB flash drive, easy to carry, now more and more people use, but also because it is convenient to carry to our data security has brought trouble, imagine, when you leave the computer when others use a U disk to the computer's important information are copied, if it is important confidential, this can be a big trouble. Is there any way to let others use the U-disk when they have t
control notification Handler code hereunsigned long s1,s2;unsigned char vendor_id[]= "------------";//CPU provider IDCString STR1,STR2,STR3;The following is the assembly language instruction for obtaining the CPU ID_ASM//Get CPU provider Information{XOR Eax,eax//will eax clear 0CPUID//command to get CPUIDmov dword ptr vendor_id,ebxmov dword ptr vendor_id[+4],edxmov dword ptr vendor_id[+8],ecx}Str1. Format ("CPU provider id:%s", vendor_id);_ASM//Get high 32 bits of CPU ID{MOV eax,01hXOR Edx,edxC
In the usual work, we often need to backup some important files to the USB drive, generally we will choose to use WinRAR tools such as hand-made the required files into a compressed package, for data security, we usually also encrypt the file, and then move it to the USB drive. Such operations are more complex, in fact, the use of Windows "Send to" menu, you can achieve more efficient encryption compression operations.
Enter SendTo in the Start Run m
As the computing and storage capabilities of smartphones increase, mobile phones will store more and more private data, and the leakage of such data may cause serious consequences. Mobile phone information security has always been one of our key points. For some important functions, we need to authenticate them before they can be used. However, this can only block novice hackers, and it can only protect against gentlemen and prevent villains, therefore, we hope to encrypt important data before s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.