Protecting Data with Encrypted Linux Partitions Part 2 - page 3
Adding Your Own Back Door
While most Linux distributions have a default
udev configuration that nails down the
/dev names of internal drives, it doesn't hurt to make extra sure by using the UUID instead. So the
/etc/fstab entry for our encrypted partition would look like this:
UUID=1c390791-bd8a-4655-b722-6d0bcbbdf547 /home/carla/crypted ext3 users,atime,noauto,rw,dev,exec,suid 0 0
Note that all of that should be on a single line with no carriage returns or line breaks.
Where do you find the UUID? With the
# vol_id -u /dev/sda2 1c390791-bd8a-4655-b722-6d0bcbbdf547
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 3Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic
- 4Linux Top 3: RHEL 6.5, Debian 7.2 and EOL for Linux 3.0.x
- 5Linux Top 3: CoreOS, Oracle Enterprise Linux 7 and Ubuntu 14.10