How to encrypt files in Linux with Tomb

by | Dec 3, 2018

Data security is undoubtedly one of the aspects that most concerns both private users and organizations. If you are a GNU / Linux user, Tomb may be the tool you were looking for. It’s a free and Open Source file encryption software that allows you to encrypt files containing sensitive information.

The way Tomb works is simple: users create a folder intended for encrypted storage within their file system and they only have to store the information they wish to protect there.

The content of the folder will be fully encrypted and can only be accessed using associated key files, which are also protected with a user-defined password. The system allows you to create as many encrypted folders (called “tombs”) as necessary, as long as there is enough free space available on your device’s hard drive.

To facilitate the use of this software, there is a GUI container called gtomb, especially useful for users with little experience in the use of this type of programs.

To know more details as well as its installation procedure, see the original article here.

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content