![]() Now when you boot the computer, just before the login screen you'll get a popup asking you for the password for workimage.tc (it also asks when switching users.or complain that it's already mounted if it is). Pressing Cancel on the password prompt will go on to the login screen, letting you use the other users without mounting the truecrypt image. It's pretty easy to setup, and lets you run a mix of encrypted and non-encrypted users on the same machine. It is not 100% secure though, as you're only encrypting that users files and settings, and not your logs or swap space. For that you would need whole drive encryption. ![]() :evil:Ī little step-by-step tutorial for the process I used (Ubuntu 10.04 圆4):ĭownload the appropriate Standard Linux package for TrueCrypt from: The 'work' folder itself should be 99.99% secure provided you've used a long random password (and nobody captures you and tortures the password out of you). (Of course there's probably a way to pass the password not in plaintext that I didn't discover.) This process can be done using the console package, but requires saving the encryption password in plaintext nullifying any improvement in security. Tar -xzvf truecrypt-7.0a-linux-圆4.tar.gzįor some reason I had to make the file executable:įollow the simple installation procedure, then create your encrypted volume: #Ubuntu truecrypt alternative password Now we need to copy your existing home folder into the encrypted volume, but we can't do that while you're logged in. If you already have another admin user you can log in to skip this step. Otherwise let's make a new user and allow it to sudo. Log out and log back in as the new user or hit ctrl+alt+f1 to go straight to the commandline. Next we'll relocate your home folder and then recreate it, but now empty (to serve only as a mountpoint for the encrypted volume). Now we need to copy your home folder data into the encrypted volume. ![]() First mount the encrypted volume.Īlmost there, now we add the instructions for your encrypted volume to be mounted when gdm starts. ![]() Insert the following code with your username and path to your encrypted container inserted. (I put these lines directly above "exit 0".) I've added a check to make sure the volume isn't already mounted, otherwise gdm was hanging on startup for me when it crashed or I had to restart it. If !(echo `mount` | grep -q "/home/ type")įinally you can restart gdm and see if it worked. (If you don't get any errors then it worked, the idea is that everything SHOULD look the same.)ġ. If everything is working you should “sudo rm -rf /home/backup” since having an unencrypted copy of files you've just encrypted is silly. If you're really worried you could copy those files off to some other secured backup medium.Ģ. ![]()
0 Comments
Leave a Reply. |