Xiki
From xiki.org Xiki merges both the shell and GUI concepts. Commands in Xiki can have nested menus that are just text indented by 2 spaces. Use the mouse or keyboard,…
Command Line Shtuff
From xiki.org Xiki merges both the shell and GUI concepts. Commands in Xiki can have nested menus that are just text indented by 2 spaces. Use the mouse or keyboard,…
From catonmat.net "Hey guys! A few weeks ago I wrote an article called All About Bash Redirections. It explains all the possible bash redirections with illustrations. I thought it would…
From catonmat.net This cheat sheet is really useful if you're learning Linux and want to have a quick overview of all the available commands! Peteris Krumins added this cheatsheet awhile…
pwgen - PWGen is a password generator capable of creating large amounts of cryptographically secure random passwords or passphrases (from word lists). It uses a random pool to gather entropy…
From ascii.io ascii.io lets you record your terminal sessions and share them with other geeks simply by running asciiio command in your term. It is fully open-source platform with aim…
From Fishshell.com Fish: the friendly interactive shell - fish is a user friendly command line shell for UNIX-like operating systems such as Linux. fish is included in Ubuntu universe. It…
How do I password protect / encrypt a file within Linux using OpenSSL ?
The file we will encrypt will be the file secretfile.txt.As you can see it is just a plain text file.
Encrypt File
Use the openssl comand to encrypt your file and then test the new file is fully encrypted.
$ openssl aes-256-cbc -salt -in secretfile.txt -out secretfile.txt.aes
enter aes-256-cbc encryption password:
Verifying – enter aes-256-cbc encryption password:
$ cat secretfile.txt.aes
binary data
Decrypt File
Decrypt the file and then confirm the decypted file is readable.
$ openssl aes-256-cbc -d -salt -in secretfile.txt.aes -out secretfile.txt
enter aes-256-cbc decryption password:
$ cat secretfile.txt
This is a secret file that we do not want anyone to read.
====================================== (more…)