Some readers recently reported to us that the truecrypt project was terminated. Is there any good replacement software on linux? After seeing the request, xiaobian immediately began to collect information, sort out and test it in person, and found a simple and easy-to-use file encryption method in Linux. The software we use here is seahorse, A GnuPG graphical front-end (for details about GnuPG, refer to Wikipedia). This software can be used on computers using gnome desktops, of course, Ubuntu (default unity desktop) can also be used
Some readers recently reported to us that the truecrypt project was terminated. Is there any good replacement software on linux? After seeing the request, xiaobian immediately began to collect information, sort out and test it in person, and found a simple and easy-to-use file encryption method in Linux.
The software we use here is seahorse, A GnuPG graphical front-end (for details about GnuPG, refer to Wikipedia). This software can be used on computers using gnome desktops, of course, Ubuntu (default unity desktop) can also be used. The following describes how to use seahorse to encrypt and sign files in Ubuntu.
The encrypted transmission http://www.linuxidc.com/Linux/2010-06/26755.htm of files in Ubuntu
Install seahorse
Installing seahorse in Ubuntu is very simple, and the software center already provides. You can search for and install it.
Use seahorse for file encryption
First, openShows the password and key:
In the "Log on" section, we mainly store various passwords, such as the automatic logon password of the website. Today we want to operate on the GnuPG key. Click the GnuPG key and then click the plus sign above to create the PGG key (Here we mainly use this key to encrypt the file. If you need other features, please explore it yourself). Click continue.
Enter the full name and other information. Note: The full name can be Chinese or English, but the full name must be at least two words. You can select RSA or DSA as the encryption type; the larger the number of self-selected keys, the more secure the Key is. The validity period can never expire.
If you do not understand, click Help in the lower left corner. after entering the information, click Create.
The following window is displayed, asking for a password. after entering the password, click OK.
Now we have completed the PGP key configuration, followed by a specific file encryption instance.
For more details, refer to the highlights on the next page.: Http://www.linuxidc.com/Linux/2014-07/104030p2.htm