Hello Sclug,

I   received   this   E-newsletter  and  though  you'd  benefit  from
it...especially those that don't get it regularly.  ;)

TechRepublic
http://www.techrepublic.com

Presents your
LINUX E-NEWSLETTER for November 19, 2002


ENCRYPT THE FILESYSTEM WITH BESTCRYPT

There has been a large movement toward the acceptance and usage of
encryption tools by the general public. Tools such as GnuPG on Linux and PGP
on Windows have allowed people to securely send mail over insecure
networks and protect documents and files on the system through encryption.

In addition, encrypted filesystems are starting to become more common.
An encrypted filesystem is usually an entire partition or file mounted via
the loopback interface that's protected with a long passphrase and
encrypted with one of a variety of different available encryption algorithms.
To access the data, the passphrase is required.

One software utility, BestCrypt, uses the loopback filesystem to mount
encrypted files as filesystems. The filesystem is encrypted--mounted or
unmounted--with BestCrypt's bctool.

With BestCrypt for Linux, you can encrypt entire directories to protect
your data. For example, if you're on a laptop, you might consider placing
your ~/.gnupg and ~/.ssh directories into an encrypted filesystem. Doing
so will prevent anyone from stealing your GPG private key or your SSH
private key.

BestCrypt is free for Linux users. However, you have to build it from
the source code because the Linux binaries for BestCrypt are not provided.
http://www.jetico.com/

----------------------------------------

BACK BY POPULAR DEMAND

SECURITY HINGES ON AUTHENTICATION, AUTHORIZATION, AND ENCRYPTION
If you want to design and manage enterprise security, it helps to
understand the big picture. Learn why you need security and how the current
methodology of authentication, authorization, and encryption can help you
achieve it.
http://cl.com.com/Click?q=d4-E0SqQ0Eeeeo-JahaGwF32y11y0PR

WATCH OVER YOUR NETWORK WITH ETHERAPE
For administrators, network monitors are invaluable tools, but they can
be costly. Luckily, the open source community has a free solution,
EtherApe. Here's how to install, configure, and use this monitoring tool on
your network.
http://cl.com.com/Click?q=e9-gdzpQxVng9KdE8fGqyh3WLNLtUiR

------------------------------------------

NEW AT TECHREPUBLIC

DOWNLOAD THIS SPREADSHEET TO TRACK YOUR WAN CIRCUITS
If you aren't inspecting and reconciling your telecom invoice, you're
probably overpaying. This tool will allow you to keep track of every WAN
circuit in your company.
http://cl.com.com/Click?q=fe-xkIgQwgDVMctpcpOPilbO06e5qrR

FINAL SCORE: MICROSOFT/CONSUMERS 2--COMPETITORS 1
While there will likely be more litigation from competitors seeking to
sanction Microsoft in some way, columnist Tim Landgrave explains why the
recent federal ruling bodes well for both Microsoft, and more important,
the public consumer sector.
http://cl.com.com/Click?q=13-NxSZI3XBQSeC3chfOKmfI-Bwql4R


----------------------------------------

This e-newsletter may contain links to sites on the Internet that are
owned and operated by third parties. CNET Networks, Inc. is not responsible
for the content of any such third-party site.


Copyright 2002 CNET Networks, Inc. All rights reserved. TechRepublic is a registered 
trademark of CNET Networks, Inc. TechRepublic Logo is a trademark of CNET Networks, 
Inc.



Best regards,
Michael Morey
mailto:[EMAIL PROTECTED]
GOD BLESS THE USA!

* * * * * * * ============
* * * * * * * ============
* * * * * * * ============
* * * * * * * ============
==========================
==========================
==========================
==========================


Reply via email to