Quantcast
Channel: Debian Ubuntu Linux Solutions Blog » Security
Browsing latest articles
Browse All 11 View Live

HOWTO: Generate a MD5SUM Checksum File for Linux ISO Images

Purpose: Suppose you have created your own Custom Linux LiveCD by generating an ISO image file using mkisofs command or any other command. Now you want to distribute these ISOs to people and therefore...

View Article



HOWTO: Encrypting a shell script on a Linux or Unix based system

Purpose: This blog entry will explain how to encrypt a shell script on your Linux or a Unix based system. Although there might be other ways to encrypt your shell script I found this one the most...

View Article

Info: Verifying MD5 checksum on Windows

Purpose: This post is a follow-up of MD5SUM for ISO images post, in which we primarily learned how to generate MD5 checksums for your ISO images. In this post, we will learn about some of the available...

View Article

Announcement: GPG/PGP Key Series

What’s all the HOOPLA about: I am glad to announce that we will soon be starting a series on GPG/PGP Key. Using GPG signature has become a standard practice for secure communication over Internet when...

View Article

GPG/PGP Keys-Part 1: Generating GPG/PGP keys on Debian Linux

Welcome to the Part 1 of GPG/PGP Key series. What we will learn: In this part we will learn how to generate your first GPG/PGP key and also how to register our key to the GPG keyservers. Step 1:...

View Article


GPG/PGP Keys-Part 2: How to send and receive encrypted files using GPG key

Welcome to the Part 2 of GPG/PGP Key series. What we learnt already: In Part 1 we saw how to generate our own unique GPG key in Linux and how to register your key to GPG keyservers. What we will learn:...

View Article

GPG/PGP Keys-Part 3: Verifying Debian ISO images encrypted sign file

Welcome to Part 3 of GPG/PGP Key series. What we will learn: In this part we will learn how to verify the encrypted signature file that is commonly found on web servers which offers download services....

View Article

GPG/PGP Keys-Part 4: Signing/Encrypting a file using GPG/PGP key

Welcome to Part 4 of GPG/PGP Key series. What we will learn: In last part we saw how to verify an encrypted sign (.sign) file to confirm if the files and their MD5SUMS were uploaded by the right...

View Article


GPG/PGP Keys-Part 5: Backing up, Restoring, Revoking and Deleting your...

Welcome to Part 5 of GPG/PGP Key series. What we will learn: This is one of the most important part of the entire series. We will learn how to manage our GPG keys – Backing it up, Restoring and...

View Article


GPG/PGP-Part 6: Review and Conclusion

Welcome to final part (Part 6) of GPG/PGP Key series. In this part we will review what we have seen so far in the previous parts and also will look at some of the important commands. Part 1: Generating...

View Article

TIP: GDM Server authentication error message

Today while was I transferring one of my Debian partitions to another hard drive using “tar” command, I happened to get the following message when I tried to boot from the hard drive on which I moved...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images