Ask Sawal

Discussion Forum
Notification Icon1
Write Answer Icon
Add Question Icon

What is pwp in linux?

3 Answer(s) Available
Answer # 1 #

Simply put, it allows you to quickly enter and retrieve passwords. How do I Authenticate users with a Password file that I have build using PWP - Password Privacy Password file contents are as under bash-2. Works on linux / mac / solaris; Simple operation; Copies passwords / notes to clipboard so they can be pasted; Auto-resets clipboard back to default state after 30. GETPW(3) Linux Programmer's Manual GETPW(3). Connecting to a remote Unix/Linux machine is actually much easier. Custom / Additional Linux/Unix Software.

[30]
Edit
Query
Report
Ayaan Thakur
BTech Agricultural Engineering, Birsa Agricultural University
Answer # 2 #

Preface

1.  Starting and Stopping the Server

2.  Configuring the Server Instance

3.  Configuring the Proxy Components

4.  Configuring Security Between Clients and Servers

5.  Configuring Security Between the Proxy and the Data Source

6.  Managing Oracle Unified Directory With Oracle Directory Services Manager

7.  Managing Directory Data

8.  Replicating Directory Data

9.  Controlling Access To Data

10.  Managing Users and Groups With dsconfig

11.  Managing Password Policies

Password Policy Components

The Default Password Policy

To View the Properties of the Default Password Policy

Password Policies in a Replicated Environment

Configuring Password Policies by Using Oracle Directory Services Manager

List the Configured Password Policy Subentries

Create a Password Policy Subentry

Create a Password Policy Subentry Based on an Existing Password Policy Subentry

Delete a Password Policy Subentry

Display the Configured Password Policies

Modify a Password Policy

Create a Password Policy

Create a Password Policy Based on an Existing Password Policy

Delete a Password Policy

Display the Supported Password Validators

Enable or Disable a Password Validator

Display the Supported Password Storage Schemes

Enable or Disable a Password Storage Scheme

12.  Managing Directory Schema

13.  Monitoring Oracle Unified Directory

[4]
Edit
Query
Report
Venetia Bhargava
Chief Gaming Officer
Answer # 3 #

Linux distribution provides a few standard encryption/decryption tools that can prove to be handy at times. Here in this article, we have covered 7 such tools with proper standard examples, which will help you to encrypt, decrypt, and password-protect your files.

If you are interested in knowing how to generate a random password from the Linux command line, read the following article:

GnuPG stands for GNU Privacy Guard and is often called GPG which is a collection of cryptographic software. Written by GNU Project in C Programming Language. The latest stable release is 2.0.27.

In most of today’s Linux distributions, the gnupg package comes by default, if in-case it’s not installed you may apt or yum it from the repository.

We have a text file (tecmint.txt) located at ~/Desktop/Tecmint/, which will be used in the examples that follows this article.

Before moving further, check the content of the text file.

Now encrypt the tecmint.txt file using gpg. As soon as you run the gpg command with option -c (encryption only with symmetric cipher) it will create a file tecmint.txt.gpg. You may list the content of the directory to verify.

Note: Enter Paraphrase twice to encrypt the given file. The above encryption was done with the CAST5 encryption algorithm automatically. You may specify a different algorithm optionally.

To see all the encryption algorithms present you may fire.

Now, if you want to decrypt the above-encrypted file, you may use the following command, but before we start decrypting we will first remove the original file i.e., tecmint.txt, and leave the encrypted file tecmint.txt.gpg untouched.

Note: You need to provide the same password you gave at encryption to decrypt when prompted.

bcrypt is a key derivation function that is based upon the Blowfish cipher. Blowfish cipher is not recommended since the time it was figured that the cipher algorithm can be attacked.

If you have not installed bcrypt, you may apt or yum the required package.

Encrypt the file using bcrypt.

As soon as you fire the above command, a new file name texmint.txt.bfe is created and the original file tecmint.txt gets replaced.

Decrypt the file using bcrypt.

Note: bcrypt does not have a secure form of encryption and hence its support has been disabled at least on Debian Jessie.

Designed as a replacement for UNIX crypt, ccrypt is a utility for file and stream encryption and decryption. It uses Rijndael cypher.

If you have not installed ccrypt you may apt or yum it.

Encrypt a file using ccrypt. It uses ccencrypt to encrypt and ccdecrypt to decrypt. It is important to notice that at encryption, the original file (tecmint.txt) is replaced by (tecmint.txt.cpt), and at decryption the encrypted file (tecmint.txt.cpt) is replaced by the original file (tecmint.txt). You may like to use the ls command to check this.

Encrypt a file.

Decrypt a file.

Provide the same password you gave during encryption to decrypt.

It is one of the most famous archive formats and it is so much famous that we generally call archive files as zip files in day-to-day communication. It uses pkzip stream cipher algorithm.

If you have not installed zip you may like to apt or yum it.

Create an encrypted zip file (several files grouped together) using zip.

Here mypassword is the password used to encrypt it. An archive is created with the name tecmint.zip with zipped files tecmint.txt, tecmint1.txt, and tecmint2.txt.

Decrypt the password-protected zipped file using unzip.

You need to provide the same password you provided at encryption.

Openssl is a command line cryptographic toolkit that can be used to encrypt messages as well as files.

You may like to install openssl if it is not already installed.

Encrypt a file using openssl encryption.

Explanation of each option used in the above command.

Decrypt a file using openssl.

The very famous open-source 7-zip archiver is written in C++ and is able to compress and uncompress most of the known archive file formats.

If you have not installed 7-zip you may like to apt or yum it.

Compress files into zip using 7-zip and encrypt it.

Decompress encrypted zip file using 7-zip.

Note: Provide the same password throughout the encryption and decryption process when prompted.

All the tools we have used till now are command based. There is a GUI-based encryption tool provided by Nautilus, which will help you to encrypt/decrypt files using a Graphical interface.

Steps to encrypt files in GUI using Nautilus encryption utility.

1. Right-click the file you want to encrypt.

2. Select the format to zip and provide the location to save. Provide the password to encrypt as well.

3. Notice the message – encrypted zip created successfully.

1. Try opening the zip in GUI. Notice the LOCK-ICON next to the file. It will prompt for a password, Enter it.

2. When successful, it will open the file for you.

[3]
Edit
Query
Report
Sully Erbe
Makeup Artist