Hello Sclug, I received this E-newsletter and though you'd benefit from it...especially those that don't get it regularly. ;)
TechRepublic http://www.techrepublic.com Presents your LINUX E-NEWSLETTER for November 19, 2002 ENCRYPT THE FILESYSTEM WITH BESTCRYPT There has been a large movement toward the acceptance and usage of encryption tools by the general public. Tools such as GnuPG on Linux and PGP on Windows have allowed people to securely send mail over insecure networks and protect documents and files on the system through encryption. In addition, encrypted filesystems are starting to become more common. An encrypted filesystem is usually an entire partition or file mounted via the loopback interface that's protected with a long passphrase and encrypted with one of a variety of different available encryption algorithms. To access the data, the passphrase is required. One software utility, BestCrypt, uses the loopback filesystem to mount encrypted files as filesystems. The filesystem is encrypted--mounted or unmounted--with BestCrypt's bctool. With BestCrypt for Linux, you can encrypt entire directories to protect your data. For example, if you're on a laptop, you might consider placing your ~/.gnupg and ~/.ssh directories into an encrypted filesystem. Doing so will prevent anyone from stealing your GPG private key or your SSH private key. BestCrypt is free for Linux users. However, you have to build it from the source code because the Linux binaries for BestCrypt are not provided. http://www.jetico.com/ ---------------------------------------- BACK BY POPULAR DEMAND SECURITY HINGES ON AUTHENTICATION, AUTHORIZATION, AND ENCRYPTION If you want to design and manage enterprise security, it helps to understand the big picture. Learn why you need security and how the current methodology of authentication, authorization, and encryption can help you achieve it. http://cl.com.com/Click?q=d4-E0SqQ0Eeeeo-JahaGwF32y11y0PR WATCH OVER YOUR NETWORK WITH ETHERAPE For administrators, network monitors are invaluable tools, but they can be costly. Luckily, the open source community has a free solution, EtherApe. Here's how to install, configure, and use this monitoring tool on your network. http://cl.com.com/Click?q=e9-gdzpQxVng9KdE8fGqyh3WLNLtUiR ------------------------------------------ NEW AT TECHREPUBLIC DOWNLOAD THIS SPREADSHEET TO TRACK YOUR WAN CIRCUITS If you aren't inspecting and reconciling your telecom invoice, you're probably overpaying. This tool will allow you to keep track of every WAN circuit in your company. http://cl.com.com/Click?q=fe-xkIgQwgDVMctpcpOPilbO06e5qrR FINAL SCORE: MICROSOFT/CONSUMERS 2--COMPETITORS 1 While there will likely be more litigation from competitors seeking to sanction Microsoft in some way, columnist Tim Landgrave explains why the recent federal ruling bodes well for both Microsoft, and more important, the public consumer sector. http://cl.com.com/Click?q=13-NxSZI3XBQSeC3chfOKmfI-Bwql4R ---------------------------------------- This e-newsletter may contain links to sites on the Internet that are owned and operated by third parties. CNET Networks, Inc. is not responsible for the content of any such third-party site. Copyright 2002 CNET Networks, Inc. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc. TechRepublic Logo is a trademark of CNET Networks, Inc. Best regards, Michael Morey mailto:[EMAIL PROTECTED] GOD BLESS THE USA! * * * * * * * ============ * * * * * * * ============ * * * * * * * ============ * * * * * * * ============ ========================== ========================== ========================== ==========================
