HOWTO: Generate a MD5SUM Checksum File for Linux ISO Images
Purpose: Suppose you have created your own Custom Linux LiveCD by generating an ISO image file using mkisofs command or any other command. Now you want to distribute these ISOs to people and therefore...
View ArticleHOWTO: Encrypting a shell script on a Linux or Unix based system
Purpose: This blog entry will explain how to encrypt a shell script on your Linux or a Unix based system. Although there might be other ways to encrypt your shell script I found this one the most...
View ArticleInfo: Verifying MD5 checksum on Windows
Purpose: This post is a follow-up of MD5SUM for ISO images post, in which we primarily learned how to generate MD5 checksums for your ISO images. In this post, we will learn about some of the available...
View ArticleAnnouncement: GPG/PGP Key Series
What’s all the HOOPLA about: I am glad to announce that we will soon be starting a series on GPG/PGP Key. Using GPG signature has become a standard practice for secure communication over Internet when...
View ArticleGPG/PGP Keys-Part 1: Generating GPG/PGP keys on Debian Linux
Welcome to the Part 1 of GPG/PGP Key series. What we will learn: In this part we will learn how to generate your first GPG/PGP key and also how to register our key to the GPG keyservers. Step 1:...
View ArticleGPG/PGP Keys-Part 2: How to send and receive encrypted files using GPG key
Welcome to the Part 2 of GPG/PGP Key series. What we learnt already: In Part 1 we saw how to generate our own unique GPG key in Linux and how to register your key to GPG keyservers. What we will learn:...
View ArticleGPG/PGP Keys-Part 3: Verifying Debian ISO images encrypted sign file
Welcome to Part 3 of GPG/PGP Key series. What we will learn: In this part we will learn how to verify the encrypted signature file that is commonly found on web servers which offers download services....
View ArticleGPG/PGP Keys-Part 4: Signing/Encrypting a file using GPG/PGP key
Welcome to Part 4 of GPG/PGP Key series. What we will learn: In last part we saw how to verify an encrypted sign (.sign) file to confirm if the files and their MD5SUMS were uploaded by the right...
View ArticleGPG/PGP Keys-Part 5: Backing up, Restoring, Revoking and Deleting your...
Welcome to Part 5 of GPG/PGP Key series. What we will learn: This is one of the most important part of the entire series. We will learn how to manage our GPG keys – Backing it up, Restoring and...
View ArticleGPG/PGP-Part 6: Review and Conclusion
Welcome to final part (Part 6) of GPG/PGP Key series. In this part we will review what we have seen so far in the previous parts and also will look at some of the important commands. Part 1: Generating...
View ArticleTIP: GDM Server authentication error message
Today while was I transferring one of my Debian partitions to another hard drive using “tar” command, I happened to get the following message when I tried to boot from the hard drive on which I moved...
View Article
More Pages to Explore .....