<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>encryption Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/encryption/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 05 Jan 2022 05:03:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>The best password managers for 2022</title>
		<link>https://www.osradar.com/the-best-password-managers-for-2022/</link>
					<comments>https://www.osradar.com/the-best-password-managers-for-2022/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Wed, 19 Jan 2022 10:42:00 +0000</pubDate>
				<category><![CDATA[Tools]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[passwords manager]]></category>
		<category><![CDATA[vault]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=34284</guid>

					<description><![CDATA[<p>Hello! Please consider this scenario. You are sitting in front of the home screen, trying unsuccessfully to remember a password you have used many times. Consequently, if you can&#8217;t remember it, you will have to reset it. Then comes another problem. In effect, you now have to remember the answer to the security question. This [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/the-best-password-managers-for-2022/">The best password managers for 2022</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Please consider this scenario. You are sitting in front of the home screen, trying unsuccessfully to remember a password you have used many times. Consequently, if you can&#8217;t remember it, you will have to reset it. Then comes another problem. In effect, you now have to remember the answer to the security question. This experience is very common. In fact, you would be surprised how many people reset their passwords recently. Therefore, many people resort to password managers to safeguard their personal information. Read on to learn about the best password managers for 2022.</p>



<h2>The Best Password Managers to Choose. Including free and paid.</h2>



<p>We assume you are new to <a href="https://www.osradar.com/how-to-manage-secure-passwords-in-windows/" target="_blank" rel="noreferrer noopener">password</a> managers. Therefore, you must be looking for that all-in-one tool. That is, that solution for all your password needs. Below, we have chosen the best password managers on the market. Security, usability, price, and functionality are considered. We also show good and at the same time free possibilities.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="512" height="512" src="https://www.osradar.com/wp-content/uploads/2022/01/pass.png" alt="" class="wp-image-34285" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass.png 512w, https://www.osradar.com/wp-content/uploads/2022/01/pass-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass-150x150.png 150w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<h2>Bitwarden</h2>



<p>Bi<a href="https://bitwarden.com/" target="_blank" rel="noreferrer noopener">twarden </a>is a solution that encodes all your information. Moreover, we are talking about an open-source software. Consequently, its infrastructure can be improved by developers from all over the world. Starting with a free offer, Bitwarden provides all the basics to secure passwords safely. For the subscription fee, it warns about the weakness of the passwords. It also includes additional security data for your accounts. The premium plan is available for the payment of $10 for a one-year subscription. This way you can enjoy premium features such as two-factor authentication, security reports and many more.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="390" src="https://www.osradar.com/wp-content/uploads/2022/01/pass2-1024x390.png" alt="" class="wp-image-34286" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass2-1024x390.png 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass2-300x114.png 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass2-768x293.png 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass2-696x265.png 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass2-1068x407.png 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass2.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2>NordPass</h2>



<p>Developed by the same people responsible for NordVPN, the well-known VPN option. <a href="https://nordpass.com/" target="_blank" rel="noreferrer noopener">NordPass</a>  is a newcomer to the neighborhood. To attract users, it offers them access to their passwords regardless of whether they are offline. Even regardless of the device they are using. It is a simple password manager that lacks many of the features of its competitors.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="600" src="https://www.osradar.com/wp-content/uploads/2022/01/pass3-1024x600.png" alt="" class="wp-image-34287" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass3-1024x600.png 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass3-300x176.png 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass3-768x450.png 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass3-696x408.png 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass3-1068x626.png 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass3.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>If you are looking for a simple password manager, without major pretensions, then NordPass is for you. Nevertheless, it includes unique features. For example, biometric protection through fingerprint scanning or its Face ID function. The free version should be more than enough for home users. However, for the $23.88 annual fee, you will enjoy premium features: password health check, synchronization between multiple devices and much more.</p>



<h2>KeePass</h2>



<p>KeePass is an offer concentrated on the basics. Indeed, it lacks an elegant user interface. However, the open-source code allows you to store all your passwords in a database that you can access with your key. Moreover, KeePass has NASA as one of its users. Sound familiar? Besides, they regularly release new versions. This option is preferred by people who just want to keep their passwords in a secure place.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="504" src="https://www.osradar.com/wp-content/uploads/2022/01/pass4-1024x504.png" alt="" class="wp-image-34288" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass4-1024x504.png 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass4-300x148.png 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass4-768x378.png 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass4-696x343.png 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass4-1068x526.png 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass4.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>With KeePass, we will forget about other functions that could distract you from the main function. It&#8217;s all about keeping your passwords safe and secure. Finally, this is a free and open-source tool.</p>



<h2>RoboForm<a href="https://kinsta.com/es/blog/administradores-contrasenas/#4-roboform"></a></h2>



<p><a href="https://www.roboform.com/" target="_blank" rel="noreferrer noopener">RoboForm </a>is an uncomplicated option for these tasks. Despite this, the password manager offers a wide range of functionalities. These include a master password generator, auto-completion of password forms, multi-platform support and many more.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="729" src="https://www.osradar.com/wp-content/uploads/2022/01/pass5-1024x729.jpg" alt="" class="wp-image-34289" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass5-1024x729.jpg 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass5-300x214.jpg 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass5-768x547.jpg 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass5-696x495.jpg 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass5-1068x760.jpg 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass5.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The tool also allows you to securely send logins. This is a point in its favor, as it is usually a feature reserved for the paid plans of competing managers. NordPass is a newcomer to the neighborhood. To attract users, it offers them access to their passwords regardless of whether they are offline. The premium version is available for a fee of $16.70 per person per year. This way we will enjoy two-factor authentication, secure shared folder, priority support over other features.</p>



<h2>Sticky Password</h2>



<p><a href="https://www.stickypassword.com/" target="_blank" rel="noreferrer noopener">Sticky Password</a> boasts an encrypted vault. Just log in to access all your passwords with a few clicks in seconds. Among its advantages, it has a very elaborate basic interface. In addition, the tool offers the possibility to share multiple devices. Consequently, passwords are always available. That is, no matter whether we are online or offline. The platform has cloud-free Wi-Fi synchronization and biometric authentication, which makes it secure.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="470" src="https://www.osradar.com/wp-content/uploads/2022/01/pass6-1024x470.jpg" alt="" class="wp-image-34290" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass6-1024x470.jpg 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass6-300x138.jpg 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass6-768x352.jpg 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass6-696x319.jpg 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass6-1068x490.jpg 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass6.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Sticky Password also offers an intelligent security control panel. From there, we can notice which passwords are not complex enough. This password manager is free. However, it also offers a premium plan with two payment options. A perpetual mode with a one-time payment of $99.99. Additionally, it offers an annual subscription for the payment of $29.99. This unlocks unlimited password sharing, synchronization and backup.</p>



<h2>LastPass</h2>



<p><a href="https://kinsta.com/es/wordpress-hosting-educacion/" target="_blank" rel="noreferrer noopener">LastPass is</a> one of the pioneers of password managers in the market. It is also considered a pioneer in the industry along with 1Password. LastPass works through the creation of a master password by the user. With this password, you log in to start saving passwords. It also functions as a vault to store passwords, secure notes and even addresses.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2022/01/pass7-1024x787.png" alt="" class="wp-image-34291" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass7-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass7-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass7-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass7-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass7-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass7.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>LastPass has extensions for almost all browsers. However, to log in, users can configure multifactor authentication as an additional security feature. In addition, it offers AES-256 bit encryption that only occurs on your device. Perhaps one point against it is that its interface is not very user-friendly. However, it offers many security tools. Besides, with time, you get used to it. On the other hand, the free version allows you to store passwords but not to share them. For the $3 monthly fee you can unlock premium features: password sharing, a security dashboard, dark web monitoring, and much more.</p>



<h2>Dashlane</h2>



<p><a href="https://www.dashlane.com/" target="_blank" rel="noreferrer noopener">Dashlane </a>offers features that go beyond a password manager. With this in mind, it scans the user&#8217;s entire digital footprint. In this way, it aims to increase the security of passwords. In addition, it stores your password information while you browse. Additionally, it incorporates a password autocomplete feature, which allows you to enter your password when you log in to an account for the first time.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="606" src="https://www.osradar.com/wp-content/uploads/2022/01/pass8-1024x606.png" alt="" class="wp-image-34292" srcset="https://www.osradar.com/wp-content/uploads/2022/01/pass8-1024x606.png 1024w, https://www.osradar.com/wp-content/uploads/2022/01/pass8-300x177.png 300w, https://www.osradar.com/wp-content/uploads/2022/01/pass8-768x454.png 768w, https://www.osradar.com/wp-content/uploads/2022/01/pass8-696x412.png 696w, https://www.osradar.com/wp-content/uploads/2022/01/pass8-1068x632.png 1068w, https://www.osradar.com/wp-content/uploads/2022/01/pass8.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Dashlane also offers a password generator. Through it, it will create a unique password for each account and store it in your password manager. These passwords are a random combination of characters, symbols, and numbers. The aim is to make unauthorized access by third parties difficult. It also has a very interesting dark web analysis tool. In effect, it scans the network and warns you if something is wrong with your passwords. Dashlane offers a free plan and a premium plan for $3.99 per month.</p>



<p>Alright, we&#8217;ve seen this compendium of the best password managers for 2022. All you have to do is choose the option that best suits your needs. See you soon!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/the-best-password-managers-for-2022/">The best password managers for 2022</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/the-best-password-managers-for-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Differences between EFS and BitLocker</title>
		<link>https://www.osradar.com/differences-between-efs-and-bitlocker/</link>
					<comments>https://www.osradar.com/differences-between-efs-and-bitlocker/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 22:49:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[EFS]]></category>
		<category><![CDATA[encryption]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=34204</guid>

					<description><![CDATA[<p>We tend to think that the files stored on the hard disk are safe. In fact, we think they are protected by the login password. However, I am sorry to tell you that this is not entirely true. Therefore, if your computer or hard drive is stolen, then your data could be at risk. Indeed, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/differences-between-efs-and-bitlocker/">Differences between EFS and BitLocker</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We tend to think that the files stored on the hard disk are safe. In fact, we think they are protected by the login password. However, I am sorry to tell you that this is not entirely true. Therefore, if your computer or hard drive is stolen, then your data could be at risk. Indeed, it would be enough to connect the hard disk to another computer to gain access to our data. If you do not want this to happen, then you must set up a file encryption mechanism. There are free tools for this task, such as VeraCrypt. However, Windows also has two native encryption systems. Therefore, today we will talk about the differences between EFS and BitLocker.</p>



<h2>The EFS encryption system in Windows</h2>



<p>As for <a href="https://www.microsoft.com/en-us/software-download/windows10" target="_blank" rel="noreferrer noopener">Windows</a>, the encryption mechanisms are only available for the professional versions. In this specific case, we are talking about Windows Pro and Enterprise. However, if we have a free version, we will at least be able to decrypt the drives and access the data. Even if the data encryption version is not available.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="612" height="612" src="https://www.osradar.com/wp-content/uploads/2021/12/efs.png" alt="" class="wp-image-34205" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs.png 612w, https://www.osradar.com/wp-content/uploads/2021/12/efs-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2021/12/efs-150x150.png 150w" sizes="(max-width: 612px) 100vw, 612px" /></figure>



<p>Windows 7 and Windows Server 2008 and later versions have two different types of encryption. One is EFS. This is an encryption system that can encrypt both individual files and folders within the hard drive. The other is BitLocker. Specifically, this is software capable of encrypting an entire drive to prevent unauthorized users from accessing the data on it. Below, we will describe the features of each one. We can then determine the differences between EFS and BitLocker.</p>



<h2>The EFS encryption system in Windows</h2>



<p>EFS stands for Encrypting File System. Specifically, this feature was introduced since NTFS 3.0 version and appeared for the first time in Windows 2000. What it does is to allow files to be encrypted on NTFS partitions. This is intended to protect sensitive data. It should also be noted that EFS is incompatible with folder compression. In summary, EFS is a fast way to encrypt files and folders. Please remember that only manually selected items will be encrypted. That is, if you add one later, then it will not be encrypted.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="1024" height="512" src="https://www.osradar.com/wp-content/uploads/2021/12/efs2.png" alt="" class="wp-image-34206" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs2.png 1024w, https://www.osradar.com/wp-content/uploads/2021/12/efs2-300x150.png 300w, https://www.osradar.com/wp-content/uploads/2021/12/efs2-768x384.png 768w, https://www.osradar.com/wp-content/uploads/2021/12/efs2-696x348.png 696w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>It is crucial to know the EFS encryption will be linked to a user account. This means that the encrypted data will only be accessible to that user and will be locked for the rest. It should also be noted that the encryption is transparent. Therefore, if an unauthorized user accesses that account, then the data will be available to him. It is not even necessary for him to know the password.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="512" height="512" src="https://www.osradar.com/wp-content/uploads/2021/12/efs3.png" alt="" class="wp-image-34207" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs3.png 512w, https://www.osradar.com/wp-content/uploads/2021/12/efs3-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2021/12/efs3-150x150.png 150w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<p>Another key point to know is that the EFS encryption key in Windows is stored in the operating system itself. Consequently, it does not use the hardware&#8217;s Trusted Platform Module. Therefore, a cybercriminal with the necessary knowledge could extract this key to access these encrypted files. Similarly, if that file were at a certain point in a temporary cache, on another part of the disk or another drive, it could also fall into the hands of the attacker.</p>



<h2>How to encrypt files with EFS in Windows</h2>



<p>This is a simple procedure that requires no configuration or additional downloads. Suppose we want to encrypt a folder called <em>osradar</em>. To achieve this, just right-click on the folder and open the <strong>Properties.</strong> Next, click on the <strong>General </strong>tab and then open the <strong>Advanced Options.</strong></p>



<figure class="wp-block-image size-full is-style-default"><img loading="lazy" width="363" height="481" src="https://www.osradar.com/wp-content/uploads/2021/12/efs4.png" alt="Entering the advanced options of a folder. " class="wp-image-34208" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs4.png 363w, https://www.osradar.com/wp-content/uploads/2021/12/efs4-226x300.png 226w" sizes="(max-width: 363px) 100vw, 363px" /><figcaption>Entering the advanced options of a folder.</figcaption></figure>



<p>In the next window, we will see a series of additional options. Please scroll down and check the <strong>Encrypt content to protect data </strong>box.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="380" height="349" src="https://www.osradar.com/wp-content/uploads/2021/12/efs5.png" alt="Setting the option to apply EFS encryption to a folder" class="wp-image-34209" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs5.png 380w, https://www.osradar.com/wp-content/uploads/2021/12/efs5-300x276.png 300w" sizes="(max-width: 380px) 100vw, 380px" /><figcaption>Setting the option to apply EFS encryption to a folder</figcaption></figure>



<p>Back to the previous window, it is time to click on Apply. Consequently, a new confirmation window will be displayed. Once there, the wizard will ask if we want to change the attributes of the folder and all the included subfolders and elements. Please select the latter option for better security.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="388" height="247" src="https://www.osradar.com/wp-content/uploads/2021/12/efs6.png" alt="Confirming the change of attributes to all items in the folder" class="wp-image-34210" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs6.png 388w, https://www.osradar.com/wp-content/uploads/2021/12/efs6-300x191.png 300w" sizes="(max-width: 388px) 100vw, 388px" /><figcaption>Confirming the change of attributes to all items in the folder</figcaption></figure>



<p>After this, the process of encrypting the elements will begin. Kindly note that this may take some time, depending on the size of the folder.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="402" height="195" src="https://www.osradar.com/wp-content/uploads/2021/12/efs7.png" alt="Applying EFS encryption in Windows 10" class="wp-image-34211" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs7.png 402w, https://www.osradar.com/wp-content/uploads/2021/12/efs7-300x146.png 300w" sizes="(max-width: 402px) 100vw, 402px" /><figcaption>Applying EFS encryption in Windows 10</figcaption></figure>



<h2>How BitLocker works in Windows</h2>



<p>The BitLocker encryption system provides disk encryption for entire volumes. In short, its main feature is that it allows to perform full-drive encryption. To this end, BitLocker uses a standard AES encryption algorithm in CBC mode with a 128-bit key. However, it is also possible to set a key length of 256 bits and configure it with the more secure XTS. This way we give you more security.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="576" height="800" src="https://www.osradar.com/wp-content/uploads/2021/12/efs8.png" alt="" class="wp-image-34212" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs8.png 576w, https://www.osradar.com/wp-content/uploads/2021/12/efs8-216x300.png 216w" sizes="(max-width: 576px) 100vw, 576px" /></figure>



<p>Thanks to this mechanism, we can encrypt an entire drive, a hard disk or a removable storage medium. This prevents unauthorized users from accessing the data contained on the drive. Even data copied after the encryption process. Its great advantage is that we do not have to manually encrypt the newly added data. In addition, this tool completely encrypts the entire drive. Consequently, no user will be able to access it without the corresponding to unlock password.</p>



<h2>How to enable BitLocker in Windows</h2>



<p>To enable BitLocker encryption, follow the steps below:</p>



<ul><li>Open <strong>Control Panel.</strong></li><li>Click <strong>System and Security</strong>, then under <strong>BitLocker Drive Encryption</strong>, select <strong>Manage BitLocker.</strong></li></ul>



<p>Then we will see a screen like this one and the units that we will be able to encrypt with BitLocker:</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2021/12/efs9-1024x787.png" alt="Drives available to apply BitLocker encryption" class="wp-image-34213" srcset="https://www.osradar.com/wp-content/uploads/2021/12/efs9-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/12/efs9-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/12/efs9-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/12/efs9-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/12/efs9-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/12/efs9.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Drives available to apply BitLocker encryption</figcaption></figure>



<p>The window displays all the drives to which you can apply BitLocker. We will even see that it is possible to encrypt removable drives. A security measure in case one day we lose a removable storage drive with confidential data. To learn about the process and its steps, we invite you to check our <a href="https://www.osradar.com/how-to-encrypt-usb-drives-in-windows-10/" target="_blank" rel="noreferrer noopener">tutorial.</a> From this post we will be able to go deeper into the differences between EFS and BitLocker.</p>



<h2>Conclusion</h2>



<p>Undoubtedly, the best Windows encryption we can use is BitLocker. Thanks to it, it will take care of encrypting the entire hard disk. Therefore, we can breathe easy. From then on, all data will be automatically encrypted. BitLocker is also recommended because it uses more secure algorithms. On the other hand, EFS is specialized in encrypting data in particular. The advantages are that it is faster and consumes fewer resources than the previous one. However, the algorithms are not as secure as those of BitLocker. In addition, we have to be prudent that we have selected the files correctly. So, we recommend using BitLocker. Finally, we have seen the differences between EFS and BitLocker. See you soon!</p>



<p></p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/differences-between-efs-and-bitlocker/">Differences between EFS and BitLocker</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/differences-between-efs-and-bitlocker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to encrypt emails.</title>
		<link>https://www.osradar.com/how-to-encrypt-emails/</link>
					<comments>https://www.osradar.com/how-to-encrypt-emails/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Tue, 11 May 2021 21:32:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[mailvelope]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=29960</guid>

					<description><![CDATA[<p>Hello! Email has undoubtedly increased its presence. Indeed, we are talking about an almost indispensable tool. So much so that it has almost completely replaced paper correspondence. This is largely due to ecological reasons. But also because of the immediacy with which messages are received. However, it has always had its share of problems. For [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-encrypt-emails/">How to encrypt emails.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Email has undoubtedly increased its presence. Indeed, we are talking about an almost indispensable tool. So much so that it has almost completely replaced paper correspondence. This is largely due to ecological reasons. But also because of the immediacy with which messages are received. However, it has always had its share of problems. For example, the lack of privacy. It is important that our personal information does not fall into the hands of third parties. Such as cybercriminals or even government agencies. Therefore, today we will see how to encrypt emails.</p>



<h2>How to encrypt emails using a browser extension.</h2>



<p>There are email providers that offer message encryption. There are also email managers such as Thunderbird that offer this possibility. However, today we will look at another option. An option that will not require you to change provider, or install an email manager. To achieve our goal, we will use a web browser extension. Specifically <a href="https://www.mailvelope.com/en" target="_blank" rel="noreferrer noopener">Mailvelope.</a> Which is an extension that we can install on Google Chrome, <a href="https://www.osradar.com/category/windows/" target="_blank" rel="noreferrer noopener">Microsoft Edge</a>, and Mozilla Firefox. Its main function is to securely encrypt emails with PGP, using webmail providers. In addition, it is compatible with Gmail and Outlook, two of the most used servers.</p>



<h2>Encrypting email with Mailvelope</h2>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/encry-1024x787.jpg" alt="" class="wp-image-29961" srcset="https://www.osradar.com/wp-content/uploads/2021/05/encry-1024x787.jpg 1024w, https://www.osradar.com/wp-content/uploads/2021/05/encry-300x231.jpg 300w, https://www.osradar.com/wp-content/uploads/2021/05/encry-768x590.jpg 768w, https://www.osradar.com/wp-content/uploads/2021/05/encry-696x535.jpg 696w, https://www.osradar.com/wp-content/uploads/2021/05/encry-1068x821.jpg 1068w, https://www.osradar.com/wp-content/uploads/2021/05/encry.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>This add-on offers end-to-end encryption for email. With the advantage that you don&#8217;t have to change your email provider. Additionally, encryption and decryption are performed on the end devices. Consequently, the data will never leave the computer unencrypted. Let&#8217;s see how to do it. First, install the extension according to your web browser.</p>



<ul><li><a href="https://chrome.google.com/webstore/detail/mailvelope/kajibbejlbohfaggdiogboambcijhkke?hl=en" target="_blank" rel="noreferrer noopener">Mailvelope for Google Chrome</a>.</li><li><a href="https://addons.mozilla.org/en/firefox/addon/mailvelope/" target="_blank" rel="noreferrer noopener">Mozilla Firefox</a>.</li><li><a href="https://microsoftedge.microsoft.com/addons/detail/mailvelope/dgcbddhdhjppfdfjpciagmmibadmoapc" target="_blank" rel="noreferrer noopener">Mailvelope for Microsoft Edge</a>.</li></ul>



<p>Once installed, we have to click on the red button of the application.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="789" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/encry2-1024x789.png" alt="" class="wp-image-29962" srcset="https://www.osradar.com/wp-content/uploads/2021/05/encry2-1024x789.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/encry2-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/encry2-768x592.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/encry2-696x536.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/encry2-1068x823.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/encry2.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Then you have to click on <strong>Let&#8217;s get start!</strong>. This will redirect us to another screen. To start, it is necessary to generate a new password. To do so, click on <strong>Generate key.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/encry3-1024x787.png" alt="" class="wp-image-29963" srcset="https://www.osradar.com/wp-content/uploads/2021/05/encry3-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/encry3-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/encry3-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/encry3-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/encry3-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/encry3.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>In the next screen you must enter a name, email and password. Finally, click on <strong>Generate.</strong> Now you have to go to the email address you provided, to verify it. This way, other Mailvelope users will be able to send us encrypted emails. You will then see an email like this in your inbox:</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="706" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/encry4-1024x706.png" alt="" class="wp-image-29964" srcset="https://www.osradar.com/wp-content/uploads/2021/05/encry4-1024x706.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/encry4-300x207.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/encry4-768x530.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/encry4-218x150.png 218w, https://www.osradar.com/wp-content/uploads/2021/05/encry4-696x480.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/encry4-1068x737.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/encry4.png 1141w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>To decrypt the message, please click on Show message. You will see a window like this, where you must enter the password you assigned. After this is done, you will reveal the content of the email. Now click on the link to verify your email account.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/encry6-1024x787.jpg" alt="" class="wp-image-29965" srcset="https://www.osradar.com/wp-content/uploads/2021/05/encry6-1024x787.jpg 1024w, https://www.osradar.com/wp-content/uploads/2021/05/encry6-300x231.jpg 300w, https://www.osradar.com/wp-content/uploads/2021/05/encry6-768x590.jpg 768w, https://www.osradar.com/wp-content/uploads/2021/05/encry6-696x535.jpg 696w, https://www.osradar.com/wp-content/uploads/2021/05/encry6-1068x821.jpg 1068w, https://www.osradar.com/wp-content/uploads/2021/05/encry6.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>You are now ready to use the program. Please remember to use the corresponding password. Also, to send an encrypted email, just click on the red button, right next to <strong>Compose.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="249" height="318" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/encry7.png" alt="" class="wp-image-29966" srcset="https://www.osradar.com/wp-content/uploads/2021/05/encry7.png 249w, https://www.osradar.com/wp-content/uploads/2021/05/encry7-235x300.png 235w" sizes="(max-width: 249px) 100vw, 249px" /></figure>



<p>Okay, ultimately we have seen how to encrypt emails. As we said, there are other options. But we found this one to be the most user friendly and easy to use. See you later!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-encrypt-emails/">How to encrypt emails.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-encrypt-emails/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to enable BitLocker in Windows Server 2019/2016</title>
		<link>https://www.osradar.com/how-to-enable-bitlocker-in-windows-server-2019-2016/</link>
					<comments>https://www.osradar.com/how-to-enable-bitlocker-in-windows-server-2019-2016/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Thu, 08 Oct 2020 21:49:00 +0000</pubDate>
				<category><![CDATA[Servers]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[BitLocker]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[encryption tool]]></category>
		<category><![CDATA[Windows server]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=24176</guid>

					<description><![CDATA[<p>The confidentiality and protection of the user&#8217;s data is fundamental in any system. In addition, this section is very important when working with Windows Server. Since the fall of sensitive files into the wrong hands can cause serious damage. For this reason, it is highly recommended encrypting the data present on the hard disk. Fortunately, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-enable-bitlocker-in-windows-server-2019-2016/">How to enable BitLocker in Windows Server 2019/2016</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The confidentiality and protection of the user&#8217;s data is fundamental in any system. In addition, this section is very important when working with Windows Server. Since the fall of sensitive files into the wrong hands can cause serious damage. For this reason, it is highly recommended encrypting the data present on the hard disk. Fortunately, Windows Server has its own data encryption infrastructure. This technology is called BitLocker, BDE-BitLocker Drive Encryption. Consequently, it is possible to encrypt entire volumes. This way, if you lose access to the device, the data will remain encrypted. For this reason, today we will see how to enable BitLocker in Windows Server 2019/2016.</p>



<h2>BitLocker. The Windows Encryption Technology.</h2>



<p>BitLocker makes use of the Reliable Platform Module technology which allows for greater security in case of an external attack. It is used to validate the booting of the server. In addition, it guarantees that the hard disk is in optimal security and operation conditions. BitLocker uses 5 operational modes in its operation:</p>



<ul><li><strong>TPM + PIN + Password</strong>: The system encrypts the information with TPM. Additionally, the administrator must enter his or her PIN and password to gain access.</li><li><strong>TPM+Password</strong>: The system encrypts the information with TPM and the administrator must provide a password.</li><li><strong>TPM + PIN</strong>: The system encrypts the information with TPM and the administrator must provide his access ID.</li><li><strong>Password: </strong>The administrator must provide the password to access management.</li><li><strong>TPM: </strong>No action is required from the administrator.</li></ul>



<h2>How to Install BitLocker on Windows Server 2019/2016</h2>



<p>The first thing you have to do is open the Server Manager. Once there, click on <strong>add roles and features.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit-1024x787.png" alt="" class="wp-image-24181" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2020/10/bit-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2020/10/bit-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2020/10/bit.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Please add roles and features</figcaption></figure>



<p>Then select <strong>Role-based and features-based installation</strong>:</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit2.png" alt="" class="wp-image-24182" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit2.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit2-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit2-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit2-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /><figcaption>Please select the type of installation</figcaption></figure>



<p>As usual in this type of installation, select the server.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit3.png" alt="Select the server for the installation." class="wp-image-24183" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit3.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit3-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit3-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit3-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /><figcaption>Select the server for the installation.</figcaption></figure>



<p>Please skip the window referring to Roles. Then, in the Features window, scroll down to get <strong>BitLocker Drive Encryption</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit4.png" alt="Select BitLocker Drive Encryption" class="wp-image-24185" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit4.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit4-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit4-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit4-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /><figcaption>Select BitLocker Drive Encryption</figcaption></figure>



<p>When you click on the corresponding box, a window with the necessary features for the installation will be displayed.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="416" height="436" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit5.png" alt="" class="wp-image-24188" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit5.png 416w, https://www.osradar.com/wp-content/uploads/2020/10/bit5-286x300.png 286w" sizes="(max-width: 416px) 100vw, 416px" /></figure>



<p>Back to the previous window, press next to continue the installation.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit6.png" alt="Pres Next to continue the installation" class="wp-image-24189" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit6.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit6-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit6-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit6-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /><figcaption>Pres Next to continue the installation</figcaption></figure>



<p>Below you will see a summary of the installation. Please press <strong>Install.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit7.png" alt="" class="wp-image-24191" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit7.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit7-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit7-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit7-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /></figure>



<p>After a few moments, the installation will be completed. Please note that you must reboot the server to complete the process.</p>



<figure class="wp-block-gallery columns-2 is-cropped"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit8.png" alt="" data-id="24192" data-full-url="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit8.png" data-link="https://www.osradar.com/?attachment_id=24192" class="wp-image-24192" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit8.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit8-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit8-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit8-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" width="786" height="560" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit9.png" alt="" data-id="24193" data-full-url="//1081754738.rsc.cdn77.org/wp-content/uploads/2020/10/bit9.png" data-link="https://www.osradar.com/?attachment_id=24193" class="wp-image-24193" srcset="https://www.osradar.com/wp-content/uploads/2020/10/bit9.png 786w, https://www.osradar.com/wp-content/uploads/2020/10/bit9-300x214.png 300w, https://www.osradar.com/wp-content/uploads/2020/10/bit9-768x547.png 768w, https://www.osradar.com/wp-content/uploads/2020/10/bit9-696x496.png 696w" sizes="(max-width: 786px) 100vw, 786px" /></figure></li></ul></figure>



<p>Finally, in this simple way we have seen how to enable BitLocker in Windows Server 2019/2016. In addition, it is our intention to increase the security of your server. All right, that&#8217;s it for today. I can&#8217;t say goodbye without inviting you to see our post about <a href="https://www.osradar.com/how-to-import-or-export-local-security-policy-in-windows-10-server-2019/" target="_blank" rel="noreferrer noopener">importing and exporting</a> the security policy in <a href="https://docs.microsoft.com/en-us/windows-server/" target="_blank" rel="noreferrer noopener">Windows Server</a> 2019/2016. Goodbye</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-enable-bitlocker-in-windows-server-2019-2016/">How to enable BitLocker in Windows Server 2019/2016</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-enable-bitlocker-in-windows-server-2019-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to install VeraCrypt on Ubuntu 18.04 / Linux Mint 19?</title>
		<link>https://www.osradar.com/install-veracrypt-on-ubuntu-18-04/</link>
					<comments>https://www.osradar.com/install-veracrypt-on-ubuntu-18-04/#comments</comments>
		
		<dc:creator><![CDATA[angeloma]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 01:20:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[howto]]></category>
		<category><![CDATA[linux mint]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[veracrypt]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=12519</guid>

					<description><![CDATA[<p>Data security is something that should never be taken lightly less in today&#8217;s world with so many vulnerabilities everywhere. Of course, there are tools in Linux that we can use to prevent this situation. In fact, there are many and some more complex than others, however, in this post I will teach you how to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/install-veracrypt-on-ubuntu-18-04/">How to install VeraCrypt on Ubuntu 18.04 / Linux Mint 19?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data security is something that should never be taken lightly less in today&#8217;s world with so many vulnerabilities everywhere. Of course, there are tools in Linux that we can use to prevent this situation. In fact, there are many and some more complex than others, however, in this post I will teach you how to install Veracrypt on Ubuntu 18.04 and Linux Mint 19. It is perhaps the best tool to encrypt Linux disks and folders.</p>
<p>Veracrypt is the direct successor to TrueCrypt that was discontinued. Veracrypt is now available for Linux, Windows, and MacOS. We are talking about a free tool to encrypt your disks and folders so anyone can open it without your permission.</p>
<p>Maybe you think it&#8217;s not useful, but imagine your portable disk or computer being stolen. This would be a problem because everyone would have access to important data, accounts, documents, photos and more. If the disk is encrypted, that person will not be able to access these data.</p>
<p>So I&#8217;ll show you how to install Veracrypt on Ubuntu 18.04.</p>
<h2>Install Veracrypt on Ubuntu 18.04</h2>
<p>First of all, you have to download the installer. We will be able to do it from the application <a href="https://www.veracrypt.fr/en/Downloads.html">website</a>. Choose the version for Linux.</p>
<p><figure id="attachment_12526" aria-describedby="caption-attachment-12526" style="width: 1030px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12526" src="https://www.osradar.com/wp-content/uploads/2019/06/1-17.png" alt="1.- Download Veracrypt" width="1030" height="517" srcset="https://www.osradar.com/wp-content/uploads/2019/06/1-17.png 1030w, https://www.osradar.com/wp-content/uploads/2019/06/1-17-300x151.png 300w, https://www.osradar.com/wp-content/uploads/2019/06/1-17-768x385.png 768w, https://www.osradar.com/wp-content/uploads/2019/06/1-17-1024x514.png 1024w, https://www.osradar.com/wp-content/uploads/2019/06/1-17-696x349.png 696w, https://www.osradar.com/wp-content/uploads/2019/06/1-17-837x420.png 837w" sizes="(max-width: 1030px) 100vw, 1030px" /><figcaption id="caption-attachment-12526" class="wp-caption-text">1.- Download Veracrypt</figcaption></figure></p>
<p>However, we can do it from the terminal. Open one, and type the following:</p>
<pre>:~$ wget -c https://launchpad.net/veracrypt/trunk/1.23/+download/veracrypt-1.23-setup.tar.bz2</pre>
<p><figure id="attachment_12527" aria-describedby="caption-attachment-12527" style="width: 1365px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12527" src="https://www.osradar.com/wp-content/uploads/2019/06/2-14.png" alt="2.- Download Veracrypt" width="1365" height="397" srcset="https://www.osradar.com/wp-content/uploads/2019/06/2-14.png 1365w, https://www.osradar.com/wp-content/uploads/2019/06/2-14-300x87.png 300w, https://www.osradar.com/wp-content/uploads/2019/06/2-14-768x223.png 768w, https://www.osradar.com/wp-content/uploads/2019/06/2-14-1024x298.png 1024w, https://www.osradar.com/wp-content/uploads/2019/06/2-14-696x202.png 696w, https://www.osradar.com/wp-content/uploads/2019/06/2-14-1068x311.png 1068w" sizes="(max-width: 1365px) 100vw, 1365px" /><figcaption id="caption-attachment-12527" class="wp-caption-text">2.- Download Veracrypt</figcaption></figure></p>
<p>Now, create an empty folder to locate the files that will appear after decompressing the file. In my case, I put the file in the personal HOME directory.</p>
<pre>:~$ mkdir veracrypt-installer &amp;&amp; cd veracrypt-installer
:~$ tar xjpf ../veracrypt-*.tar.bz2</pre>
<p>Now to be able to run the installer, you have to make it executable. To do this, run the following command:</p>
<pre>:~$ chmod -R +x .</pre>
<p>If we use the command <code>ls</code> to see the contents of the folder. We will notice that there are four files. There are two ways to install Veracrypt, either through a graphical interface or through the console. Both installers for <strong>32-bit or 64-bit system</strong>.</p>
<pre>:~$ ls
veracrypt-1.23-setup-console-x64  veracrypt-1.23-setup-console-x86  
veracrypt-1.23-setup-gui-x64  veracrypt-1.23-setup-gui-x86</pre>
<p>Choose according to your system. Normally, the currents equipment are 64-bit. You can choose the graphical installer but I will use the terminal installer. It is faster and more efficient. And believe me, it is pretty easy to use.</p>
<h3>Veracrypt console installer</h3>
<p>Then we can start the installer. First, choose the installation option.</p>
<pre>:~$ ./veracrypt-1.23-setup-console-x64</pre>
<p><figure id="attachment_12528" aria-describedby="caption-attachment-12528" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12528" src="https://www.osradar.com/wp-content/uploads/2019/06/3-10.png" alt="3.- Install Veracrypt on Ubuntu 18.04" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2019/06/3-10.png 1366w, https://www.osradar.com/wp-content/uploads/2019/06/3-10-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2019/06/3-10-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2019/06/3-10-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2019/06/3-10-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2019/06/3-10-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2019/06/3-10-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-12528" class="wp-caption-text">3.- Install Veracrypt on Ubuntu 18.04</figcaption></figure></p>
<p>Then, you will see the terms of the license.</p>
<p><figure id="attachment_12529" aria-describedby="caption-attachment-12529" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12529" src="https://www.osradar.com/wp-content/uploads/2019/06/4-8.png" alt="4.- Veracrypt license" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2019/06/4-8.png 1366w, https://www.osradar.com/wp-content/uploads/2019/06/4-8-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2019/06/4-8-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2019/06/4-8-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2019/06/4-8-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2019/06/4-8-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2019/06/4-8-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-12529" class="wp-caption-text">4.- Veracrypt license</figcaption></figure></p>
<p>In the end, you will be asked if you agree with the license. If so, type &#8220;yes&#8221; and press enter. Then, to start the installation you will be asked for the user password.</p>
<p><figure id="attachment_12530" aria-describedby="caption-attachment-12530" style="width: 855px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12530" src="https://www.osradar.com/wp-content/uploads/2019/06/5-6.png" alt="5.- Install Veracrypt on Ubuntu 18.04" width="855" height="543" srcset="https://www.osradar.com/wp-content/uploads/2019/06/5-6.png 855w, https://www.osradar.com/wp-content/uploads/2019/06/5-6-300x191.png 300w, https://www.osradar.com/wp-content/uploads/2019/06/5-6-768x488.png 768w, https://www.osradar.com/wp-content/uploads/2019/06/5-6-696x442.png 696w, https://www.osradar.com/wp-content/uploads/2019/06/5-6-661x420.png 661w" sizes="(max-width: 855px) 100vw, 855px" /><figcaption id="caption-attachment-12530" class="wp-caption-text">5.- Install Veracrypt on Ubuntu 18.04</figcaption></figure></p>
<p>Then, wait for the installation to finish. To run it, type veracrypt into the terminal and press enter.</p>
<pre>:~$ veracrypt</pre>
<h3>Install Veracrypt GUI</h3>
<p>If you are going to use Veracrypt&#8217;s graphical interface, first, uninstall Veracrypt CLI. Then launch the installer.</p>
<pre>:~$ sudo veracrypt-uninstall.sh
:~$ ./veracrypt-1.23-setup-gui-x64</pre>
<p><figure id="attachment_12531" aria-describedby="caption-attachment-12531" style="width: 555px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12531" src="https://www.osradar.com/wp-content/uploads/2019/06/6-5.png" alt="6.- Veracrypt graphical installer" width="555" height="284" srcset="https://www.osradar.com/wp-content/uploads/2019/06/6-5.png 555w, https://www.osradar.com/wp-content/uploads/2019/06/6-5-300x154.png 300w" sizes="(max-width: 555px) 100vw, 555px" /><figcaption id="caption-attachment-12531" class="wp-caption-text">6.- Veracrypt graphical installer</figcaption></figure></p>
<p>After you choosing Install Veracrypt option, you will see the license terms.</p>
<p><figure id="attachment_12532" aria-describedby="caption-attachment-12532" style="width: 555px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12532" src="https://www.osradar.com/wp-content/uploads/2019/06/7-4.png" alt="7.- Terms of license" width="555" height="604" srcset="https://www.osradar.com/wp-content/uploads/2019/06/7-4.png 555w, https://www.osradar.com/wp-content/uploads/2019/06/7-4-276x300.png 276w, https://www.osradar.com/wp-content/uploads/2019/06/7-4-386x420.png 386w" sizes="(max-width: 555px) 100vw, 555px" /><figcaption id="caption-attachment-12532" class="wp-caption-text">7.- Terms of license</figcaption></figure></p>
<p>Then, enter your user password and the installation will begin. To the terminal, use the veracrypt command to run the application.</p>
<p><figure id="attachment_12533" aria-describedby="caption-attachment-12533" style="width: 586px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-12533" src="https://www.osradar.com/wp-content/uploads/2019/06/8-4.png" alt="8.- Veracrypt running" width="586" height="580" srcset="https://www.osradar.com/wp-content/uploads/2019/06/8-4.png 586w, https://www.osradar.com/wp-content/uploads/2019/06/8-4-300x297.png 300w, https://www.osradar.com/wp-content/uploads/2019/06/8-4-424x420.png 424w" sizes="(max-width: 586px) 100vw, 586px" /><figcaption id="caption-attachment-12533" class="wp-caption-text">8.- Veracrypt running</figcaption></figure></p>
<p>So, that&#8217;s it.</p>
<h2>Conclusion</h2>
<p>The best way to protect your data is to use Veracrypt to encrypt it. It is a free, powerful and quite useful program to improve the security of our computer and data.</p>
<p>Please share this post with your friends. They may need it.</p>
<p>You can also read <a href="https://www.osradar.com/protect-your-files-on-linux-with-tomb/">our post about </a>Tomb. Another way to encrypt your data.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/install-veracrypt-on-ubuntu-18-04/">How to install VeraCrypt on Ubuntu 18.04 / Linux Mint 19?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/install-veracrypt-on-ubuntu-18-04/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Protect your files on Linux with Tomb</title>
		<link>https://www.osradar.com/protect-your-files-on-linux-with-tomb/</link>
					<comments>https://www.osradar.com/protect-your-files-on-linux-with-tomb/#respond</comments>
		
		<dc:creator><![CDATA[angeloma]]></dc:creator>
		<pubDate>Tue, 27 Nov 2018 19:42:22 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[folders]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[howto]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tomb]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=7705</guid>

					<description><![CDATA[<p>The privacy of our documents is not something to be taken lightly. Because it is possible that one day an intruder might steal our data. In this article, I will show you how to protect your files on Linux with Tomb. You&#8217;ve probably heard about encrypting files on Linux. First of all, it is good [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/protect-your-files-on-linux-with-tomb/">Protect your files on Linux with Tomb</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The privacy of our documents is not something to be taken lightly. Because it is possible that one day an intruder might steal our data. In this article, I will show you how to protect your files on Linux with Tomb.</p>
<p>You&#8217;ve probably heard about encrypting files on Linux. First of all, it is good to say that this is a great way to protect your files as you can create a key file and a password to access them, that is, double security.</p>
<p>To do the above, there are several applications, but one of it of Tomb. <a href="https://github.com/dyne/Tomb" rel="noopener">Tomb</a> is a 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files.</p>
<p>Tomb generates encrypted storage folders to be opened and closed using their associated key files, which are also protected with a password chosen by the user. So, if you want to protect your files and folders on Linux, then Tomb is a great option.</p>
<p>Let&#8217;s install it.</p>
<h1>Install Tomb on Linux</h1>
<p>Tomb, for now, is only available for Linux. So, if you use Arch Linux, your installation is reduced to running a single command. If you use Debian, Ubuntu, and derivatives you have to add a repository.</p>
<p>For Arch Linux</p>
<pre class="">:~$ yay -S tomb gtomb</pre>
<p>For Debian 9, Ubuntu 18.04 and Ubuntu derivates it is necessary to add the <a href="https://sparkylinux.org/" rel="noopener">SparkyLinux</a> repository. First, open a terminal and create a repo.list file.</p>
<pre class="">:~$ sudo nano /etc/apt/sources.list.d/sparky-repo.list</pre>
<p>Next, add the following:</p>
<pre class="">deb https://sparkylinux.org/repo stable main
deb-src https://sparkylinux.org/repo stable main
deb https://sparkylinux.org/repo testing main
deb-src https://sparkylinux.org/repo testing main</pre>
<p><figure id="attachment_7708" aria-describedby="caption-attachment-7708" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7708" src="https://www.osradar.com/wp-content/uploads/2018/11/1-22.png" alt="1.- Adding the SparkyLinux repository" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/1-22.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/1-22-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/1-22-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/1-22-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/1-22-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/1-22-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/1-22-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7708" class="wp-caption-text">1.- Adding the SparkyLinux repository</figcaption></figure></p>
<p>Save and close the file. Then, download the GPG key and add it to APT.</p>
<pre class="">:~$ wget -O - https://sparkylinux.org/repo/sparkylinux.gpg.key | sudo apt-key add -</pre>
<p><figure id="attachment_7709" aria-describedby="caption-attachment-7709" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7709" src="https://www.osradar.com/wp-content/uploads/2018/11/2-21.png" alt="2.- Adding the GPG key" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/2-21.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/2-21-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/2-21-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/2-21-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/2-21-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/2-21-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/2-21-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7709" class="wp-caption-text">2.- Adding the GPG key</figcaption></figure></p>
<p>Next, refresh the APT cache.</p>
<pre class="">:~$ sudo apt update</pre>
<p><figure id="attachment_7710" aria-describedby="caption-attachment-7710" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7710" src="https://www.osradar.com/wp-content/uploads/2018/11/3-20.png" alt="3.- Running apt update command" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/3-20.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/3-20-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/3-20-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/3-20-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/3-20-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/3-20-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/3-20-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7710" class="wp-caption-text">3.- Running apt update command</figcaption></figure></p>
<p>Finally, install <code>tomb</code> package.</p>
<pre class="">:~$ sudo apt install tomb</pre>
<p><figure id="attachment_7711" aria-describedby="caption-attachment-7711" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7711" src="https://www.osradar.com/wp-content/uploads/2018/11/4-22.png" alt="4.- Install tomb" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/4-22.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/4-22-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/4-22-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/4-22-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/4-22-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/4-22-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/4-22-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7711" class="wp-caption-text">4.- Install tomb</figcaption></figure></p>
<p>That&#8217;s it. Now, let&#8217;s use it.</p>
<h1>Protect your files with Tomb</h1>
<p>tomb allows you to encrypt folders and files through a file that serves as a key. This, in turn, is protected with a password. Encrypted folders are called <em>tombs</em>. Then, let&#8217;s create an example.</p>
<p>I will create a <em>tomb</em> called <em>osradar</em> with size 150MB. Remember a <em>tomb</em> is a folder. You must run the commands as root user.</p>
<p><em>Note: it is necessary to deactivate the swap partition.</em></p>
<pre class="">:~$ sudo swapoff -a</pre>
<p><figure id="attachment_7714" aria-describedby="caption-attachment-7714" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7714" src="https://www.osradar.com/wp-content/uploads/2018/11/5-20.png" alt="5.- Deactivating the swap partition" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/5-20.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/5-20-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/5-20-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/5-20-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/5-20-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/5-20-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/5-20-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7714" class="wp-caption-text">5.- Deactivating the swap partition</figcaption></figure></p>
<pre class="">:~$ sudo tomb dig -s 150 osradar.tomb</pre>
<p><figure id="attachment_7715" aria-describedby="caption-attachment-7715" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7715" src="https://www.osradar.com/wp-content/uploads/2018/11/6-17.png" alt="6.- Creating a new tomb" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/6-17.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/6-17-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/6-17-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/6-17-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/6-17-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/6-17-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/6-17-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7715" class="wp-caption-text">6.- Creating a new tomb</figcaption></figure></p>
<p>As I said before, the tomb is protected by a key file. Create it.</p>
<pre class="">:~$ sudo tomb forge osradar.tomb.key</pre>
<p><figure id="attachment_7716" aria-describedby="caption-attachment-7716" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7716" src="https://www.osradar.com/wp-content/uploads/2018/11/7-17.png" alt="7.- Creating the key file" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/7-17.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/7-17-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/7-17-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/7-17-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/7-17-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/7-17-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/7-17-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7716" class="wp-caption-text">7.- Creating the key file</figcaption></figure></p>
<p>Then, you will have to enter the key file password twice.</p>
<p><figure id="attachment_7723" aria-describedby="caption-attachment-7723" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7723" src="https://www.osradar.com/wp-content/uploads/2018/11/8-17.png" alt="8.- Setting a password for the keyfile" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/8-17.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/8-17-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/8-17-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/8-17-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/8-17-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/8-17-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/8-17-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7723" class="wp-caption-text">8.- Setting a password for the key file</figcaption></figure></p>
<p>Finally, you will see this.</p>
<p><figure id="attachment_7724" aria-describedby="caption-attachment-7724" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7724" src="https://www.osradar.com/wp-content/uploads/2018/11/9-15.png" alt="9.- Keyfile created" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/9-15.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/9-15-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/9-15-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/9-15-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/9-15-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/9-15-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/9-15-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7724" class="wp-caption-text">9.- Keyfile created</figcaption></figure></p>
<p>The next step is to lock the folder with the key file. You have to type the password.</p>
<pre class="">:~$ sudo tomb lock osradar.tomb -k osradar.tomb.key</pre>
<p><figure id="attachment_7725" aria-describedby="caption-attachment-7725" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7725" src="https://www.osradar.com/wp-content/uploads/2018/11/10-12.png" alt="10.- Locking the tomb with the keyfile" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/10-12.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/10-12-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/10-12-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/10-12-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/10-12-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/10-12-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/10-12-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7725" class="wp-caption-text">10.- Locking the tomb with the key file</figcaption></figure></p>
<p>Next, you will see this.</p>
<p><figure id="attachment_7726" aria-describedby="caption-attachment-7726" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7726" src="https://www.osradar.com/wp-content/uploads/2018/11/11-7.png" alt="11.- The tomb is locked" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/11-7.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/11-7-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/11-7-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/11-7-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/11-7-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/11-7-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/11-7-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7726" class="wp-caption-text">11.- The tomb is done. You can protect your files now.</figcaption></figure></p>
<h1>Opening the tomb</h1>
<p>So, you know how to protect your folder with the key file. However, there&#8217;s still how to open it, why else, what&#8217;s the point?</p>
<p>You need to run this command and type the password.</p>
<pre class="">:~$ sudo tomb open osradar.tomb -k osradar.tomb.key</pre>
<p><figure id="attachment_7728" aria-describedby="caption-attachment-7728" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7728" src="https://www.osradar.com/wp-content/uploads/2018/11/12-5.png" alt="12.- Entering the password" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/12-5.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/12-5-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/12-5-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/12-5-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/12-5-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/12-5-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/12-5-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7728" class="wp-caption-text">12.- Entering the password</figcaption></figure></p>
<p><figure id="attachment_7729" aria-describedby="caption-attachment-7729" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7729" src="https://www.osradar.com/wp-content/uploads/2018/11/13-4.png" alt="13.- Opening a tomb" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/13-4.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/13-4-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/13-4-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/13-4-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/13-4-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/13-4-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/13-4-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7729" class="wp-caption-text">13.- Opening a tomb</figcaption></figure></p>
<p>And you will open the folder normally.</p>
<p><figure id="attachment_7730" aria-describedby="caption-attachment-7730" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7730" src="https://www.osradar.com/wp-content/uploads/2018/11/14-4.png" alt="14.- The folder has mounted" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/14-4.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/14-4-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/14-4-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/14-4-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/14-4-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/14-4-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/14-4-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7730" class="wp-caption-text">14.- The folder has been mounted</figcaption></figure></p>
<p>Finally, when you finish working with the tomb, close it.</p>
<pre class="">:~$ sudo tomb close</pre>
<p><figure id="attachment_7734" aria-describedby="caption-attachment-7734" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-7734" src="https://www.osradar.com/wp-content/uploads/2018/11/15-3.png" alt="15.- Closing the tomb" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/11/15-3.png 1366w, https://www.osradar.com/wp-content/uploads/2018/11/15-3-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/11/15-3-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/11/15-3-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/11/15-3-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2018/11/15-3-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/11/15-3-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-7734" class="wp-caption-text">15.- Closing the tomb</figcaption></figure></p>
<p>If you have many tombs opened.</p>
<pre class="">:~$ sudo tomb slam all</pre>
<p>So, that&#8217;s it.</p>
<h1>Conclusion</h1>
<p>It&#8217;s never too much work to protect your files on Linux. Especially if they are private files that you don&#8217;t want anyone to be able to open. To do this, you have a simple tool like tomb that is very powerful and few commands let you encrypt a folder where you can store the most important things on your computer.</p>
<p>About security, we also talked about Buttercup a password manager. You can read it <a href="https://www.osradar.com/buttercup-a-password-manager-for-linux/">here</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/protect-your-files-on-linux-with-tomb/">Protect your files on Linux with Tomb</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/protect-your-files-on-linux-with-tomb/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>End-to-end Encryption Improvement – Better Security!</title>
		<link>https://www.osradar.com/end-end-encryption-improvement-better-security/</link>
					<comments>https://www.osradar.com/end-end-encryption-improvement-better-security/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Wed, 10 Jan 2018 12:25:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Better Security]]></category>
		<category><![CDATA[encryption]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1023</guid>

					<description><![CDATA[<p>The web is a very nasty place when the case is about security. There are always hackers waiting for the slightest chance of stealing sensitive info. People are making orders, banking, emailing, exchanging and a lot more online. These are very sensitive and personal data, requiring strong safety. The end-to-end encryption is a really strong [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/end-end-encryption-improvement-better-security/">End-to-end Encryption Improvement – Better Security!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The web is a very nasty place when the case is about security. There are always hackers waiting for the slightest chance of stealing sensitive info. People are making orders, banking, emailing, exchanging and a lot more online. These are very sensitive and personal data, requiring strong safety. The end-to-end encryption is a really strong solution. Now, researchers have developed a new, improved method to ensure that only the sender &amp; the receiver reads the message.</p>
<p>The new research was carried out by Professor Mark Ryan at the University of Birmingham, Dr. Jiangshan Yu at the University of Luxembourg and Professor Cas Cremers at the University of Oxford. Heartbleed bug motivated this team to carry out further research on cryptography.</p>
<h2>What is end-to-end encryption?</h2>
<p>End-to-end encryption is very strong on its own. It encrypts a data in a way that only the sender and receiver will be able to decrypt the message. The data won’t be readable by telecom providers, ISPs (Internet Service Provider) or even the app provider!</p>
<p>The ultimate goal is to defeat any attempt of surveillance or tampering by any third party. Surveillance is a big issue in present days. The greatest example is the leaks by Edward Snowden, disclosing the activities of NSA – how dangerous surveillance could be. End-to-end encryption seems to be the perfect solution.</p>
<h2>How end-to-end encryption works</h2>
<p>In this system, only the sender and the receiver must know the unlocking key. That’s why end-to-end encryption system utilizes a pre-arranged string of symbols, named a pre-shared secret (PGP) or using a one-time key from such a pre-shared secret (DUKPT). In cases, both parties can negotiate using a secret key on-spot using the Diffie-Hellman key exchange.</p>
<p>Thus, the secret key is only known to 2 sides – no sneaking by any third party or surveillance service. The data is only decrypted at client devices.</p>
<p><figure id="attachment_1027" aria-describedby="caption-attachment-1027" style="width: 535px" class="wp-caption aligncenter"><img loading="lazy" class="wp-image-1027" src="https://www.osradar.com/wp-content/uploads/2018/01/end-to-end-1-300x188.png" alt="end-to-end encryption" width="535" height="335" srcset="https://www.osradar.com/wp-content/uploads/2018/01/end-to-end-1-300x188.png 300w, https://www.osradar.com/wp-content/uploads/2018/01/end-to-end-1-768x480.png 768w, https://www.osradar.com/wp-content/uploads/2018/01/end-to-end-1-696x435.png 696w, https://www.osradar.com/wp-content/uploads/2018/01/end-to-end-1-672x420.png 672w, https://www.osradar.com/wp-content/uploads/2018/01/end-to-end-1.png 800w" sizes="(max-width: 535px) 100vw, 535px" /><figcaption id="caption-attachment-1027" class="wp-caption-text">End-to-end encryption workflow</figcaption></figure></p>
<p>&nbsp;</p>
<h2>New improvement</h2>
<p>Even with the current end-to-end encryption, the data isn’t secured if the hacker compromises the client device. For example, according to Edward Snowden’s data leak, Microsoft allowed backdoor in their Skype app to deliver data to the NSA. Scientists are trying to fix this issue at the same time.</p>
<p>However, the newly improved system will force the attacker to leave a trace behind and notify the user(s) about the data breach. According to Dr. Yu, end-to-end encryption is really excellent at keeping hackers in check. However, with a compromised device, there’s nothing to do.</p>
<p>In the current encryption system, if the ISP and messaging service provider get access to the encryption key in any way, there’s nothing to do to stop them from spying on you. The new system, called DECIM (Detecting Endpoint Compromise in Messaging), certifies new key pairs for both the sender and receiver. The system stores the certificates in a tamper-resistant public ledger.</p>
<p>According to Dr. Yu, there’s no silver bullet in the end-to-end encryption system. However, they hope that their contribution will add an extra layer of security, leveling the playing field for both hackers and users.</p>
<h2>End-to-end encryption usage</h2>
<p>End-to-end encryption made its debut in the field of security with WhatsApp. Now, because of the viability and security, most of the messaging apps, including Facebook Messenger, TextSecure, Jabber and Apple’s iMessage use end-to-end encryption.</p>
<p>Some cloud backup services like SpiderOak and Wuala uses end-to-end encryption as well. They allow you to use your personal password as the encryption key. The local program encrypts the data on the machine. What the online servers do is preserve the data – they don’t know the password!</p>
<p>End-to-end encryption is a powerful tool for building a safer web. However, no method is secure enough – every digital device is hackable but at least, can defend enough to stay secure for the time being.</p>
<p>Take a look at this new <a href="https://www.osradar.com/man-middle-attack-banking-apps-stake/">&#8220;Man-in-the-middle&#8221; flaw in banking apps</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/end-end-encryption-improvement-better-security/">End-to-end Encryption Improvement – Better Security!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/end-end-encryption-improvement-better-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
