Timothy Hospedales:
> I am wondering what is the recommended way to secure a sizeable volume
> (0.5-2GB) of confidential data such that it is non-retreivable/unusable
> even in the event that a hacker has gained user level or root
> access?
Removable harddisk? Hardware encryption?
If a hacker ca
Timothy Hospedales:
> Which leaves the option of having a dedicated physical drive and
> unplugging it when I leave. But that is annoying since I would have to
> leave my machine open all the time.
You can get `drawers' for hard disks that let you slide the HDD in and out
a slot on the front of t
Timothy,
There are a few encrypted filesystems for Linux.
Ones aimed at distributed filesystems (NFS replacements):
- "CFS", which has been packaged and is available from non-us.debian.org.
- "TCFS", http://tcfs.dia.unisa.it/
I used CFS several years ago and it seemed to work well. My only
comp
Jolyon Suthers dixit:
> >
> The best option that I know about is the Cryptographic File System. When
> mounted
> you can't tell the difference between it and any other type of file system;
> but if you
> haven't got it mounted - the data is encrypted (equivilent to PGP I think in
> quality)
>
> Yo
Hi,
Probably isn't a goot idea (I really believe that there is a better software
solution), but have you considered some removable storing device, like jazz
drive from iomega? I only saying this since you have considered having a
dedicated hard drive.
Paulo.
Timothy Hospedales writes:
> Hi,
>Hi,
>I am wondering what is the recommended way to secure a sizeable volume
(0.5-2GB
>) of confidential data such that it is non-retreivable/unusable even in the
>event that a hacker has gained user level or root access?
>
>I have thought of some kind of encryption; but I haven't seen anything fa
6 matches
Mail list logo