Date: November 17, 2012
Filed in: frontpage, howto

Full disk encryption with Ubuntu Linux

Ubuntu is one of the most popular Linux distributions and a good start for a secure and yet easy-to-use computing environment. In order to install it go to Ubuntu’s website to download the current release for your desktop or laptop computer and follow the installation guidelines there.****

Setting up full disk encryption in Ubuntu

During the installation of Ubuntu check the “Encrypt the new Ubuntu installation for security” box in the graphical installer to activate full disk encryption (dm-crypt with the symmetric AES encryption algorithm  is then used for that purpose):

continue reading…

Date: November 11, 2012
Filed in: frontpage, howto

How to choose a secure password

This article explains how to choose a secure password. For example, this is necessary to secure encrypted data or private keys against brute-force attacks. An introduction to encryption algorithms is given in the corresponding primer (brute-force attacks are also explained there).

You should never use the same password for multiple purposes. It is fine to use the build-in password manger of the Firefox web browser to store your website passwords, but only if they are secured properly (by using hard disk encryption with a strong password as described below and the master-password feature).

continue reading…

Date: November 05, 2012
Filed in: concepts, frontpage

Encryption algorithms: a primer

Encryption algorithms are used to secure the content of communications and stored data.  An algorithm in general is a recipe for calculations which can be performed automatically by a computer. An encryption algorithm (also called a cipher) encrypts a readable plaintext into an unreadable ciphertext. A cipher can usually also perform the reverse operation of decrypting an unreadable ciphertext into a readable plaintext.  For encryption and decryption a cipher needs a key. The security of a cipher depends on the secrecy of the used key.  Two general categories of encryption algorithms exist:

continue reading…