亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? cryptmount.8.in

?? Cryptmount是對(duì)Linux系統(tǒng)下的文件系統(tǒng)以及用戶設(shè)備、文檔等進(jìn)行加密的系統(tǒng).
?? IN
字號(hào):
.\" cryptmount manual page.\" $Revision: 117 $, $Date: 2006-07-30 10:20:45 +0100 (Sun, 30 Jul 2006) $.\" Copyright (c) 2005,2006 RW Penney.\".TH CRYPTMOUNT 8 "2006-07-17" "@PACKAGE_VERSION@" "User commands".SH NAMEcryptmount \- mount/unmount/configure an encrypted filing system.\" --------------------------------.SH SYNOPSIS.BI "cryptmount [\-aclmu] [target ...]".LP.BI "cryptmount [\-\-change\-password [target ...]]".LP.BI "cryptmount [\-\-generate\-key \fIsize\fP [target ...]]".LP.BI "cryptmount [\-\-prepare [target ...]]".LP.BI "cryptmount [\-\-release [target ...]]"___DELETE_CSWAP_0.LP.BI "cryptmount [\-\-swapon [target ...]]".LP.BI "cryptmount [\-\-swapoff [target ...]]"___END_CSWAP_0.\" --------------------------------.SH DESCRIPTION.Bcryptmountallows a user to mount an encrypted filing systemwithout requiring superuser privileges,and assists the superuser in creating new encrypted filesystems.After initial configuration of the filing system by the system administrator,the user needs only to provide the decryption password for that filing sytem in order for.B cryptmountto automatically configure device-mapper and loopback targets before mounting the filing system..B cryptmountwas written in response to differences betweenthe newer device-mapper infrastructure of the linux-2.6 kernel series,and the older cryptoloop infrastructure which allowed ordinary usersaccess to encrypted filing systems directly through.B mount(8)..\" --------------------------------.SH OPTIONS.TP.B \-a \-\-allact on all available targets, e.g. for mounting all targets..TP.B \-m \-\-mountmount the specified target, configuring any required device-mapperor loopback devices.The user will be asked to supply a password to unlockthe decryption key for the filing system..TP.B \-u \-\-unmountunmount the specified target, and deconfigure any underlying device-mapperor loopback devices.No password is required, although the operation will failif the filing system is in use, or if a non-root user triesto unmount a filing system mounted by a different user..TP.B \-l \-\-listlists all available targets, including basic information about the filing system and mount point of each..TP.B \-c \-\-change\-passwordchange the password protecting the decryption key for a given filing system..TP.B \-\-generate\-key "\fIsize\fP"setup a decryption key for a new filing system..IR size\fPgives the length of the key in bytes..TP.B \-\-prepareprepare all the device-mapper and loopback devices needed to access a target, but do not mount.This is intended to allow the superuser to install a filing system on an encrypted device..TP.B \-\-releasereleases all device-mapper and loopback devices associated with a particular target. This option is only available to the superuser.___DELETE_CSWAP_0.TP.B \-\-swaponenable the specified target for paging and swapping.This option is only available to the superuser..TP.B \-\-swapoffdisable the specified target for paging and swapping.This option is only available to the superuser.___END_CSWAP_0.\" --------------------------------.SH RETURN CODES.B cryptmountreturns zero on success.A non-zero value indicates a failure of some form, with specific values traceable, in principle, to different error conditions..\" --------------------------------.SH EXAMPLE USAGESuppose that we wish to setup a new encrypted filing system, that will have a target-name of "opaque".If we have a free disk partition available, say /dev/hdb63, then we can use this directly to store the encrypted filing system.Alternatively, if we want to store the encrypted filing system within an ordinary file, we need to create space using a recipe such as:.nf    dd if=/dev/zero of=/home/opaque.fs bs=1M count=512.fiand then replace all occurences of '/dev/hdb63' in the followingwith '/home/opaque.fs'.(/dev/urandom can be used in place of /dev/zero, debatably for extra security,but is rather slower.)First, we need to add an entry in @etcdir@/cmtab,which describes the encryption that will be usedto protect the filesystem itself and the access key, as follows:.nf    opaque {        dev=/dev/hdb63 dir=/home/crypt        fstype=ext2 fsoptions=defaults cipher=twofish        keyfile=@etcdir@/opaque.key keyhash=md5 keycipher=bf\-cbc    }.fiHere, we will be using the "twofish" algorithm to encryptthe filing system itself,with the "bf\-cbc" and "md5" algorithms being usedto protect the decryption key (to be stored in @etcdir@/opaque.key).In order to generate a secret decryption key (in @etcdir@/opaque.key)that will be used to encrypt the filing system itself,we can execute, as root:.nf    cryptmount \-\-generate\-key 32 opaque.fiThis will generate a 32-byte (256-bit) key,which is known to be supported by the Twofish cipher algorithm,and store it in encrypted formafter asking the system administrator for a password.If we now execute, as root:.nf    cryptmount \-\-prepare opaque.fiwe will then be asked for the password that we used when setting up @etcdir@/opaque.key, which will enable.B cryptmountto setup a device-mapper target (/dev/mapper/opaque).(Alternatively, if the encrypted filing system resides on a raw disk partition, one can use.B cryptsetup(8)as follows:.nf    openssl enc \-d \-md md5 \-bf\-cbc @etcdir@/opaque.key | \\    cryptsetup \-c twofish \-d /dev/stdin create opaque /dev/hdb63.fito perform a similar process.)We can now use standard tools to create the actual filing system on /dev/mapper/opaque:.nf    mke2fs /dev/mapper/opaque.fi(It may be advisable, after the filesystem is first mounted,to check that the permissions of the top-level directorycreated by mke2fs are appropriate for your needs.)After executing.nf    cryptmount \-\-release opaque    mkdir /home/crypt.fi(or using the equivalent recipe for.Bcryptsetup), the encrypted filing system is ready for use.Ordinary users can mount it by typing.nf    cryptmount \-m opaque.fior.nf    cryptmount opaque.fiand unmount it using.nf    cryptmount \-u opaque.fi.B cryptmountkeeps a record of which user mounted each filesystemin order to provide a locking mechanism to ensure thatonly the same user (or root) can unmount it..\" --------------------------------.SH PASSWORD CHANGINGAfter a filesystem has been in use for a while,one may want to change the access password.For an example target called "opaque", this can be performed by executing:.nf    cryptmount \-\-change\-password opaque.fiAfter successfully supplying the old password, one can then choosea new password which will be used to re-encrypt the access key for thefilesystem.(The filesystem itself is not altered or re-encrypted.)___DELETE_FSCK_1.\" --------------------------------.SH FILESYTEM MAINTENANCEFor filesystems that are mounted on system-startup,it is normal for checks on their integrityto be performed automatically at regular intervals,typically every few dozen mounts.If.B cryptmounthas not been compiled with the '\-\-enable\-fsck' option,such checks need to be performed manuallyfor filesystems managed by.B cryptmount, which will require the involvement of both the system administratorand the users who know the relevant access passwordsfor the filing systems involved.Suppose that we wish to check the filesystem associated with.B cryptmounttarget 'opaque', we first need to prepare the decryption devices:.nf    cryptmount \-\-prepare opaque.fithis will create a device-mapper target accessible via '/dev/mapper/opaque', on which we can then run standard checking utilities:.nf    fsck \-t auto /dev/mapper/opaque.fiAfter these tests have been completed, we can then release the devices:.nf    cryptmount \-\-release opaque.fiand continue using the filesystem as before.___END_FSCK_1.\" --------------------------------.SH FILES.I @etcdir@/cmtab- main configuration file.LP.I @etcdir@/cmstatus- record of mounted filesystems.SH "SEE ALSO".BR cmtab (5),.BR cryptsetup (8),.BR dmsetup (8),.BR fsck (8),.BR mount (8),.BR openssl (1).\" --------------------------------.SH BUGSThe author would be grateful for any.B constructivesuggestions and bug-reports, via <rwpenney@users.sourceforge.net>.\" --------------------------------.SH COPYRIGHT NOTICE.B cryptmountis Copyright 2005-2006 RW Penney.brand is supplied with NO WARRANTY.Licencing terms are as described in the file "COPYING"within the cryptmount source distribution.

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
337p亚洲精品色噜噜狠狠| 国产福利91精品一区| 国产老妇另类xxxxx| 日本黄色一区二区| 国产三级一区二区三区| 亚洲成人先锋电影| 99re66热这里只有精品3直播| 欧美疯狂性受xxxxx喷水图片| 日韩一区有码在线| 韩国视频一区二区| 欧美精品久久一区| 中文字幕佐山爱一区二区免费| 韩国v欧美v日本v亚洲v| 欧美日韩一区二区在线视频| 中文字幕的久久| 久久av资源网| 欧美日本精品一区二区三区| 亚洲色图另类专区| 成人av综合一区| 久久久久久久久一| 欧美人妖巨大在线| 综合电影一区二区三区 | 亚洲欧美一区二区视频| 精品系列免费在线观看| 欧美浪妇xxxx高跟鞋交| 亚洲靠逼com| 波多野结衣在线aⅴ中文字幕不卡| 精品捆绑美女sm三区| 日韩电影在线免费看| 欧美区在线观看| 亚洲一区影音先锋| 日本高清不卡aⅴ免费网站| 亚洲欧洲av另类| 波波电影院一区二区三区| 久久久99精品久久| 精品亚洲porn| 久久久久久麻豆| 国产成人无遮挡在线视频| 欧美精品一区二区三区在线播放 | 亚洲精品视频在线观看网站| 成人h动漫精品一区二区| 久久福利资源站| 日韩欧美国产午夜精品| 蜜臀av一区二区三区| 91精选在线观看| 麻豆精品一区二区三区| 日韩欧美一区二区免费| 经典三级一区二区| 久久久电影一区二区三区| 国产美女精品一区二区三区| 久久久另类综合| 成人综合在线网站| 国产精品精品国产色婷婷| 日韩一区二区三区电影在线观看| 香蕉乱码成人久久天堂爱免费| 欧美日韩一区在线观看| 日本在线播放一区二区三区| 宅男在线国产精品| 麻豆91在线看| 久久久国产综合精品女国产盗摄| 粉嫩aⅴ一区二区三区四区五区| 中文字幕不卡三区| 91极品美女在线| 亚洲123区在线观看| 欧美一区日韩一区| 国产一区免费电影| 国产精品免费aⅴ片在线观看| 中文字幕精品一区二区精品绿巨人| 国产精华液一区二区三区| 中文字幕成人av| 欧美在线一二三四区| 视频一区视频二区中文字幕| 日韩视频一区二区| 国产成人av资源| 亚洲男女毛片无遮挡| 欧美日韩精品欧美日韩精品| 美国十次了思思久久精品导航| 久久久久国色av免费看影院| 欧美日韩一区二区三区高清 | 91麻豆精品国产| 久久99国产精品久久99| 国产欧美日韩在线| 91九色02白丝porn| 免费国产亚洲视频| 国产精品高清亚洲| 91免费版pro下载短视频| 亚洲成人免费在线观看| 国产精品欧美久久久久一区二区| 欧美卡1卡2卡| 91视频免费观看| 激情成人综合网| 午夜欧美电影在线观看| 国产精品久久久久久久久免费樱桃 | 欧美一区二区观看视频| 99精品热视频| 国产精品中文字幕一区二区三区| 亚洲成人av福利| 成人免费一区二区三区视频| 欧美白人最猛性xxxxx69交| 色综合 综合色| 丁香亚洲综合激情啪啪综合| 美脚の诱脚舐め脚责91| 亚洲成人自拍网| 亚洲男女一区二区三区| 欧美激情综合在线| 精品国精品国产尤物美女| 欧美精品久久一区二区三区| 色哟哟国产精品免费观看| 成人性视频免费网站| 精品一区二区三区香蕉蜜桃| 婷婷中文字幕一区三区| 一区二区三区欧美视频| 亚洲欧洲日韩一区二区三区| 国产亚洲制服色| 精品国产电影一区二区| 欧美一区二区三区的| 欧美日韩一二三区| 欧美日韩一区视频| 欧美亚洲丝袜传媒另类| 91麻豆精品视频| 99国产精品99久久久久久| 懂色av一区二区三区免费观看| 日韩欧美国产成人一区二区| 欧美群妇大交群中文字幕| 欧美在线综合视频| 在线一区二区三区| 色美美综合视频| 一本色道久久综合亚洲91| 91在线视频网址| 色综合激情久久| 在线中文字幕一区| 在线一区二区三区四区五区| 色诱视频网站一区| 色婷婷av一区二区三区gif| 91在线免费视频观看| www.亚洲精品| 99re这里只有精品视频首页| 不卡的电影网站| 97精品国产97久久久久久久久久久久| 成人性视频免费网站| av成人免费在线| 一本久久精品一区二区| 色综合av在线| 欧美日韩一级二级| 欧美一级精品大片| 欧美v日韩v国产v| 久久久亚洲国产美女国产盗摄| 久久五月婷婷丁香社区| 久久久99久久| 亚洲欧洲三级电影| 亚洲一本大道在线| 日韩精品亚洲一区| 久久精品噜噜噜成人av农村| 国产伦精品一区二区三区视频青涩 | 国产成人精品免费网站| 成人综合在线视频| 一本久道中文字幕精品亚洲嫩| 在线观看av一区| 欧美二区乱c少妇| 久久影院午夜片一区| 欧美国产综合一区二区| 亚洲视频网在线直播| 亚洲动漫第一页| 老司机精品视频导航| 国产成人在线看| 97成人超碰视| 欧美高清你懂得| 久久婷婷成人综合色| 中文字幕亚洲不卡| 亚洲国产成人av网| 精品在线一区二区三区| 成人在线综合网站| 欧美性高清videossexo| 精品日韩在线观看| 国产精品伦一区二区三级视频| 亚洲激情自拍偷拍| 美国精品在线观看| 成人免费视频国产在线观看| 在线视频中文字幕一区二区| 91精品久久久久久久99蜜桃 | 精品1区2区在线观看| 国产精品美女久久福利网站| 亚洲一区二区视频在线观看| 蜜桃av一区二区三区电影| 不卡的电影网站| 7777精品伊人久久久大香线蕉| 26uuu亚洲综合色| 99久久久久久| 日韩一区二区三区免费看| 中文字幕第一区二区| 视频在线观看国产精品| 成人激情小说网站| 欧美美女直播网站| 中文字幕精品一区二区三区精品| 五月婷婷久久丁香| 成人做爰69片免费看网站| 欧美一区二区在线看| 国产精品电影院| 久久精品久久99精品久久| 色综合网色综合|