•  Home
  •  Dashboard
  •  Company
    • About Us
    • Blog
    • Careers
    • Contact Us
    • Data Centers
    • Looking Glass
    • Network
    • Reseller
  •  Hosting Services
    • Infrastructure
      • iColocation
    • Compute
      • cMetal
      • cVirtual
    • Storage
      • sObject
      • sBlock
    • Networking
      • nCDN
      • nIP Transit
      • nWavelength
    • Protection
      • pBackup
      • pDDoS
  •  Solutions
    • Ecommerce
    • Finance
    • Gaming
    • Hosting
    • Management
    • Security
    • System Integrator
  •  Support
    • Community
    • Knowledge Base
    • Open A Ticket
  •  USA & Canada: 800-933-1517
  •  International: 626-549-2801
  •  Email: sales@psychz.net
  • Services
    • new-colocation-header-img
      Infrastructure
      • iColocation
    • new-compute-header-img
      Compute
      • cMetal
      • cVirtual
    • new-storage-header-img
      Storage
      • sObject
      • sBlock
    • new-networking-header-img
      Networking
      • nCDN
      • nIP Transit
      • nWavelength
    • new-protection-header-img
      Protection
      • pBackup
      • pDDoS
  • Solutions
    • Ecommerce
    • Security
    • Gaming
    • Hosting
    • Management
    • Finance
    • System Integrator
  • Dashboard

顶级加密软件对于Linux

  • Home
  • Client
  • Blog
  • Linux的
  • 顶级加密软件对于Linux

顶级加密软件对于Linux

  • Category: Linux的
  • Author: Admin
  • Publisher: Psychz Networks
  • January 26,2016

 

System admins rely on backup, cloning and encryption to keep data safe and secure.  When it comes to encryption, many Linux users have relied on TrueCrypt to encrypt their data for a long, long time. Last year, without warning, the anonymous developers stopped work on the software claiming that the software was no longer secure – leaving many worried about the security of their files and searching for a new encryption solution. Here are our suggestions – and best of all, they’re all free to implement.

 

VeraCrypt

This is the easiest way to transition from TrueCrypt for several reasons. The primary one is that much of the code was taken directly from TrueCrypt so VeraCrypt works in much the same way and looks somewhat similar (all the way down to the somewhat-messy, relatively-simple interface). VeraCrypt supports the most important encryption ciphers including AES, Serpent, and TwoFish, and allows encryption at all levels, even permitting the creation of encrypted volumes within encrypted volumes. Another important plus is that it encrypts on the fly, meaning that files remain encrypted unless and until they’re actually needed. Because it’s based on TrueCrypt, you might think that it could support your existing containers and files; it doesn’t, but can easily convert them to the VeraCrypt format – another reason why it’s the easiest option if TrueCrypt left you hanging.

 

Linux Unified Key Setup

For those who are just starting down the data encryption path, the simplest way to do it is with this option which comes bundled with Ubuntu and many other Linux distributions. You can choose the encryption during your initial Linux install, and it will provide an encrypted root partition and encrypted Swap via AES. The stronger and newer dm_crypt is also available on kernel versions 2.6 and later as well as in DragonFly BSD if you’re comfortable working at the command line level.

 

GNU Privacy Guard

GnuPG (obviously part of the German GNU project) is open-source software based on PGP (Pretty Good Privacy) – which, as you probably know, is more than pretty good. GnuPG comes as an installable package on most major Linux distributions including RedHat, Debian, and Ubuntu, although it can also be built directly from the source. It’s been integrated into Evolution and KMail and there are a number of graphical front ends available. This is versatile encryption software, able to drill down to individual files, handle volumes and disk images, and even encrypt external media or drives. GnuPG uses a combination of symmetric-key and public-key encryption, using Cast5 on earlier versions and AES on the latest ones.

 

DiskCryptor

Originally based on and compatible with TrueCrypt, this reliable software has since been modified but resembles its predecessor in many ways including the use of AES, Twofish, Serpent and combinations of them all. It allows the user to encrypt whole drives or partitions but doesn’t normally work at the file level. That makes it a worthwhile option for some users (and also makes the software extremely lightweight), but certainly isn’t a full-featured choice for those who want to be able to encrypt selectively.

If you need assistance installing or configuring any of the programs listed above on your dedicated server, please feel free to contact our support department and we would be happy to assist you. 

Categories

Copyright © 2025 Psychz Networks,
A Profuse Solutions Inc Company
Hosting Services
Infrastructure
  • iColocation
Compute
  • cMetal
  • cVirtual
Storage
  • sObject
  • sBlock
Networking
  • nCDN
  • nIP Transit
  • nWavelength
Protection
  • pBackup
  • pDDoS
Company
  • About Us
  • Blog
  • Careers
  • Contact Us
  • Data Centers
  • Looking Glass
  • Network
  • Reseller
Policies
  • Acceptable Usage Policy
  • Privacy Policy
  • Service Level Agreement
  • Terms and Conditions
Support
  • Community
  • Knowledge Base
  • Open A Ticket
Get In Touch
  • Psychz Networks,
    A Profuse Solutions Company
    611 Wilshire Blvd #300
    Los Angeles,California 90017
    USA
  • US/Canada: 800-933-1517
  • International: 626-549-2801