Dm-crypt

Results: 8



#Item
1System software / Computer architecture / Software / Disk file systems / Disk encryption / Cryptographic software / FreeBSD / GEOM / Dm-crypt / Loop device / Device file / Dd

Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2011-05-27 21:21:17
2Software / System software / BestCrypt / TrueCrypt / On-the-fly encryption / EncFS / Dm-crypt / Filesystem in Userspace / Filesystem-level encryption / Disk encryption / Cryptographic software / Cryptography

GROUP TEST ENCRYPTION ENCRYPTION GROUP TEST Mayank Sharma gathers the best file encryption tools

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2014-11-12 07:50:35
3Encryption / Keychain / Advanced Encryption Standard / Cold boot attack / Key derivation function / Brute-force attack / Dm-crypt / Password / Public-key cryptography / Cryptography / Disk encryption / Cryptographic software

Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-05-05 09:27:53
4Computing / System software / FreeOTFE / Dm-crypt / TrueCrypt / Fstab / Linux Unified Key Setup / File system / Backup / Software / Cryptographic software / Disk encryption

Encrypting removable storage devices Removable device encryption – R/W compatible with Linux and Windows for TF-CSIRT, 22nd Meeting – Oporto, PT

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2007-09-26 07:40:10
5

Prinzipielles Modes of Operation DM-Crypt

Add to Reading List

Source URL: paulasmuth.com

Language: German - Date: 2013-10-08 17:36:14
    6Device mapper / System software / Logical Volume Manager / Dm-crypt / Multipath I/O / Device file / Data striping / Logical volume management / Ioctl / Computing / Computer storage / Computer architecture

    Device mapper (kernel part of LVM2 volume management)

    Add to Reading List

    Source URL: mbroz.fedorapeople.org

    Language: English - Date: 2008-04-29 08:11:12
    7Disk encryption theory / Dm-crypt / Linux Unified Key Setup / TrueCrypt / Block cipher modes of operation / PBKDF2 / Crypt / Advanced Encryption Standard / Initialization vector / Cryptography / Disk encryption / Cryptographic software

    PDF Document

    Add to Reading List

    Source URL: clemens.endorphin.org

    Language: English
    8Dm-crypt / Disk encryption theory / Linux Unified Key Setup / Block cipher modes of operation / TrueCrypt / PBKDF2 / Cryptoloop / Advanced Encryption Standard / Authenticated encryption / Cryptography / Disk encryption / Cryptographic software

    PDF Document

    Add to Reading List

    Source URL: clemens.endorphin.org

    Language: English
    UPDATE