Skip to content

TechRepublic

Trending Now

the relationship between VPNs, computers, and the network with encrypted connections
Image: Funtap/Adobe Stock
Article

Get one year of this leading VPN for just $30

Businessman holds the model of business, made from wood blocks. Alternative risk concept, business plan and business strategy. Insurance concept.
Image: Michail Petrov/Adobe Stock
Article

Managing the element of risk in projects

Ransomware infects a computer's system.
Credit: Adobe
Article

How traditional security tools fail to protect companies against ransomware

featuremicrosoft461682196.jpg

Image: Microsoft News

Article

Tech News You May Have Missed: June 23-30

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Security

Screenshots: Five easy-to-use tools to handle encryption on Linux

By Jack Wallen June 10, 2015, 8:57 AM PDT

Image
1
of 6
Previous Next

Screenshots: Five easy-to-use tools to handle encryption on Linux

Introduction

Image: iStock/Christopher Boswell

Introduction

If you think data is more precious than ever, you shouldrncertainly consider its security to be a priority. And with more and morernbusinesses working with multiple platforms, you have to be prepared to workrnwith encryption on just about every business-ready operating system available. IncludingrnLinux. Fortunately, you have plenty of encryption-ready tools to choose from.

But which tools should you be looking at? If you open up,rnsay, the Ubuntu Software Center, you’ll find the majority of tools availablern(under the “encryption” search results) to be nothing more thanrnlibraries to resolve dependencies. Dig a bit deeper, though, and you’ll find everythingrnyou need for easy-to-use encryption. I’ve uncovered five such tools forrnencryption on the Linux platform.

Note: This gallery is also available as an article.

Image: iStockphoto.com/ChrisBoswell

Image: iStock/Christopher Boswell
GnuPG
GnuPG
Screenshots: Five easy-to-use tools to handle encryption on Linux

GnuPG

GnuPG

The command to encrypt a file is:

gpg -c filename

where filename isrnthe name of the file to encrypt. The encryption will attach a .gpg extension tornthe file.

To decrypt a file, the command is

gpg filename.gpg

This is the easiest, fastest way to encrypt files (even though you dornhave to touch the command line).

VeraCrypt
VeraCrypt
Screenshots: Five easy-to-use tools to handle encryption on Linux

VeraCrypt

VeraCrypt

VeraCrypt is an enhanced version of TrueCryptrnthat works on a much more secure level. How much more secure? Well, TrueCryptrnuses PBKDF2-RIPEMD160 with 1,000 iterations—and VeraCrypt uses 327,661rniterations. The GUI for VeraCrypt is simple to use and walks you through thernentire process of creating encrypted containers.

VeraCrypt
VeraCrypt
Screenshots: Five easy-to-use tools to handle encryption on Linux

VeraCrypt

VeraCrypt

One caveat: The creation, encryption, mounting, andrndecryption of containers take a bit of time. But the added time is worth thernextra security. VeraCrypt can load containers created by TrueCrypt and convertrnTrueCrypt containers to the VeraCrypt format.

KGpg
KGpg
Screenshots: Five easy-to-use tools to handle encryption on Linux

KGpg

KGpg

With a GUI like KGpg, you remove that barrier to entry andrnmanaging those encryption keys becomes exponentially easier. And KGpg comesrnwith a built-in editor that allows you to open and edit simple text documents.rnWith this editor you can also encrypt and decrypt those documents, although yourncan’t open documents created in tools such as LibreOffice or Microsoft Word.rnThis is text-only.

Gnome Encfs Manager
Gnome Encfs Manager
Screenshots: Five easy-to-use tools to handle encryption on Linux

Gnome Encfs Manager

Gnome Encfs Manager

Gnome Encfs Manager makes creating “stashes” (akarncontainers) easy. With just a few clicks, you can create and configure a hiddenrnfolder on your Linux directory. Options include mounting on boot, idle timeoutrnlocks, stash groups, and password change. Gnome Encfs Manager can work only withrnencfs, so you won’t be decrypting containers from other systems—this isrnLinux-only.

  • Security
  • Software
  • Account Information

    Share with Your Friends

    Screenshots: Five easy-to-use tools to handle encryption on Linux

    Your email has been sent

Share: Screenshots: Five easy-to-use tools to handle encryption on Linux
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice