The data on a stolen laptop may be far more valuable than the device itself.
These days, data is mobile. Every day, sensitive corporate data leaves a company's headquarters on a flash drive or an employee's laptop. Regardless of where it is going, mobile data can be an I.T. department's worst nightmare.
This article offers commands and discussed the past, present, and future of disk encryption within the Fedora Linux Project. After many years of security feature development and testing, the Fedora Project now has a disk encryption platform. Creative developers and administrators can use these tools to secure information, even on the most vulnerable and mobile hardware platforms. From supporting the kernel to encrypting the entire filesystem, the Fedora Project provides solid disk encryption capabilities.
PS: There is also discussion (and flamewar) going on regarding TrueCrypt software solution.
- 30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X
- Top 30 Nmap Command Examples For Sys/Network Admins
- 25 PHP Security Best Practices For Sys Admins
- 20 Linux System Monitoring Tools Every SysAdmin Should Know
- 20 Linux Server Hardening Security Tips
- Linux: 20 Iptables Examples For New SysAdmins
- Top 20 OpenSSH Server Best Security Practices
- Top 20 Nginx WebServer Best Security Practices
- 20 Examples: Make Sure Unix / Linux Configuration Files Are Free From Syntax Errors
- 15 Greatest Open Source Terminal Applications Of 2012
- My 10 UNIX Command Line Mistakes
- Top 10 Open Source Web-Based Project Management Software
- Top 5 Email Client For Linux, Mac OS X, and Windows Users
- The Novice Guide To Buying A Linux Laptop