|
2008-07-18
, 17:34
|
|
Posts: 3,397 |
Thanked: 1,212 times |
Joined on Jul 2008
@ Netherlands
|
#82
|
|
2008-07-22
, 15:17
|
|
Posts: 43 |
Thanked: 12 times |
Joined on Jun 2008
@ Winnpeg, MB, CAN
|
#83
|
|
2008-07-23
, 16:08
|
|
Posts: 107 |
Thanked: 26 times |
Joined on Jan 2008
@ New Jersey
|
#84
|
|
2008-07-23
, 16:49
|
|
Posts: 43 |
Thanked: 12 times |
Joined on Jun 2008
@ Winnpeg, MB, CAN
|
#85
|
|
2008-07-23
, 17:57
|
|
Posts: 107 |
Thanked: 26 times |
Joined on Jan 2008
@ New Jersey
|
#86
|
# mount
...I don't see this mount point in the list, but perhaps I'm not supposed to.
Also, this mount seems to survive a shut down (without power adapter plugged in). Interesting...
Nokia-N800-50-2:/media/mmc2# /home/user/tc6 --filesystem=vfat test-tc6-vol secure Warning: Your system uses an old version of the Linux kernel. Due to a bug in the Linux kernel, your system may stop responding when writing data to a TrueCrypt volume. This problem can be solved by upgrading the kernel to version 2.6.24 or later. Enter password for /media/mmc2/test-tc6-vol: Enter keyfile [none]: Protect hidden volume? (y=Yes/n=No) [No]: Nokia-N800-50-2:/media/mmc2# mount <unimportant mount point entries deleted> fuse on /var/tmp/.truecrypt_aux_mnt1 type fuse (rw,nosuid,nodev,user_id=0,group_id=0,allow_other) /dev/loop0 on /media/mmc2/secure type vfat (rw,fmask=0077,dmask=0077,codepage=cp437,iocharset=iso8859-1) Nokia-N800-50-2:/media/mmc2# cd secure Nokia-N800-50-2:/media/mmc2/secure# ls dsc00106.jpg dsc00107.jpg Nokia-N800-50-2:/media/mmc2/secure# cd .. Nokia-N800-50-2:/media/mmc2# /home/user/tc6 -d Nokia-N800-50-2:/media/mmc2# FUSE and /dev/loop0 mount points are gone.
|
2008-07-24
, 17:51
|
|
Posts: 43 |
Thanked: 12 times |
Joined on Jun 2008
@ Winnpeg, MB, CAN
|
#87
|
|
2008-07-24
, 20:48
|
|
Posts: 107 |
Thanked: 26 times |
Joined on Jan 2008
@ New Jersey
|
#88
|
|
2008-07-24
, 20:55
|
|
Posts: 43 |
Thanked: 12 times |
Joined on Jun 2008
@ Winnpeg, MB, CAN
|
#89
|
|
2008-09-14
, 16:07
|
Posts: 551 |
Thanked: 46 times |
Joined on Oct 2007
|
#90
|
I think you're referring to keeping a container on a remote server and having the remote server actually mount the volume so the server is doing the crypto. The only thing I'd be careful with in that scenario is that you dismount the volume when you're done.
I'm not sure I'd bother encrypting a hard drive or volume on a server that is powered on 24/7 unless you're worried about it getting physically stolen. If someone can physically get to the server and access it locally via the console or copy out your data to a USB device then encryption won't really help.
http://www.securix.net
http://www.prog.fm