Error when opening a LUKS encrypted container file /dev/loop0 Device or resource is busy on Ubuntu 18.10 Gnome Desktop

When you enter the command below in a terminal window: $ sudo /sbin/losetup /dev/loop0 /home/user1/folder1/containerdatafile <enter> Device error or resource busy error message appears and the device is not setup. The reason is that /dev/loop0 is taken by snap. To overcome the error, change /dev/loop0 to something else like /dev/loop35 Or, if you do not … Continue reading Error when opening a LUKS encrypted container file /dev/loop0 Device or resource is busy on Ubuntu 18.10 Gnome Desktop

Recover encrypted ecryptfs home folder from encrypted dm-crypt luks disk volume

Whew... saved by the skin of teeth. The grub2 bootloader of my computer got corrupt. I was not able to boot into the computer and all was lost. For security reasons, I set up LVM with full disk encryption. Thereafter, each user's home folder was further encrypted with ecryptfs (the default you get when you … Continue reading Recover encrypted ecryptfs home folder from encrypted dm-crypt luks disk volume

How to extend expiry date of Gnu Privacy Guard Keys (GPG/PGP) keys

When PGP/GPG keys expire, you have option to generate a sub key (if you think your key has been compromised), or you can extend the validity of the current key by extending it's expiry period. You can extend the key's expiry period since the keys are not compromised. To continue, Open a terminal window and … Continue reading How to extend expiry date of Gnu Privacy Guard Keys (GPG/PGP) keys

How to encrypt swap partition on Ubuntu 14.04 LTS

If you installed Ubuntu 14.04 afresh, and selected home folder encryption, you will also get an encrypted swap partition. However, when the computer boots, you get the following error message: the disk drive for /dev/mapper/cryptswap1 is not ready yet or not present. Note that you need to have a proper data backup and make sure … Continue reading How to encrypt swap partition on Ubuntu 14.04 LTS

How to setup HTTPS for web interface in OpenWRT

By default, you can log in to the OpenWRT firmware installed on your router using http://192.168.1.1. However, if you want to add encryption on that connection, you need to be able to login using https://192.168.1.1. To do that, you need to enable HTTPS support on the router. To do so, open a terminal window on … Continue reading How to setup HTTPS for web interface in OpenWRT

How to use GNU Privacy Guard / GnuPG / GPG / PGP to encrypt email and data

Okay... on this blog post, we explained the finer details of GNU Privacy Guard or GPG or GnuPG or PGP. Activities that are required to be performed were explained in detail with the commands to perform them. However, you would still not be able to connect the dots, without this grand overview of GNU Privacy … Continue reading How to use GNU Privacy Guard / GnuPG / GPG / PGP to encrypt email and data

How to revoke a GnuPG / GPG key in Linux

If your Gnu Privacy Guard or GPG or GnuPG key has been compromised or something has gone wrong, you can revoke your key. Make sure that you generated a revocation certificate and stored in a safe place to do so. To revoke a key, open a terminal in Linux, and enter the following command: $ … Continue reading How to revoke a GnuPG / GPG key in Linux

How to add GnuPG / GPG key ID to the Evolution email client in Linux and use it

We saw how to create a GPG, GnuPG or PGP key pair in earlier posts. Now we need to tell Evolution that we have a PGP key pair that can be used to sign email messages and also encrypt them. To sign, all you need is create a GPG, GnuPG or PGP key pairthe private … Continue reading How to add GnuPG / GPG key ID to the Evolution email client in Linux and use it

How to receive other people’s GnuPG / PGP public key from a key server into your key ring

You will be able to sign emails using your private key by default. This means that people know that it is your email ID that is the originator of the email. However, if you want to send people encrypted messages, you need to have their public keys in your key ring. You need to get … Continue reading How to receive other people’s GnuPG / PGP public key from a key server into your key ring

How to send GPG public key to a PGP key server

After keys have been generated, we need to ensure that we spread our public key far and wide. It can be attached to every email we send to others, but the problem is, it becomes a big pain to do every time. The easiest way to spread the public key far and wide is to … Continue reading How to send GPG public key to a PGP key server