Encrypting files and drives

Tools

The menu item zC | erase data in a device gives particularly security-conscious zuluCrypt users the option of deleting existing data physically from a container. For this purpose, it overwrites the entire container contents with random characters, making a reconstruction of previously existing data impossible. The container itself is kept. To enable the secure delete function, you must first unmount the encrypted drives. You cannot purge unnecessary data files from mounted drives.

Conclusions

ZuluCrypt gives users a small but powerful encryption program that is suitable for every need due to its diversity of functions. In the lab, the software was very stable and ran without the slightest problem. The program impressed with its fast speed: creating encrypted drives with multiple-gigabyte sizes was achieved within a short time, and even deleting larger containers took just a few seconds.

The biggest shortcoming of zuluCrypt turned out to be the lack of distribution packages, which makes the installation process cumbersome and time-consuming. However, once you have overcome these hurdles, zuluCrypt gives you a highly useful tool that can significantly increase the security of your personal information.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Disk Encryption

    Encrypted volumes have long since ceased to be an exception or luxury. Corporate policies and compliance rules often demand encryption for critical data. This article looks at tools for disk encryption on Linux.

  • Mofo Linux

    Mofo Linux enables secure digital communications, even in places where it is politically or ideologically unwelcome.

  • VeraCrypt

    Protect your data and operating system from prying eyes with VeraCrypt.

  • VeraCrypt

    The VeraCrypt encryption software comes with a handy graphical interface, and the ability to hide a container in an encrypted volume adds a unique professional feature: plausibly deniable encryption.

  • Encrypting Block Devices

    The recent revelations about NSA spying have sparked renewed interest in data encryption. Encrypting at the file level is quick and easy, but if you're looking for an extra dose of protection, try encrypting the whole block device.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News