http://www.linux.com/feature/123579
Feature: Wireless & Mobile Securing Linux laptops By Rick Cook on January 07, 2008 (9:00:00 PM)
Print Comments Laptop and notebooks are being stolen at an ever-increasing rate. In 2004, Safeware Insurance which sells computer insurance, estimated 600,000 laptop and notebooks a year were being stolen. In 2006 an estimated 750,000 were being swiped, according to Absolute Software a company that makes computer tracking products -- and does not support Linux. LoJack For Laptops, another computer tracing company -- which also does not support Linux -- says FBI statistics show 2 million laptop and notebook computers were stolen in the US in a recent year. While the figures may not agree in detail, they all show that laptop and notebook theft is a major problem -- and if you're not careful, your Linux laptop might be next.
......
For the rest see the URL.
So what options do we have for encrypting partitions.
Can you encrypt a LVM that has /home on it (or just the ext3 in the LVM)?
What about /boot on a USB dongle. I actually think I know how to do this at install with Disk Druid. But can you unmount /boot after booting up (don't want to walk around with the dongle on the system, wear it around my neck on a lanyard).
On Tue, January 8, 2008 9:14 am, Robert Moskowitz wrote: <snip>
So what options do we have for encrypting partitions.
<snip>
I found this article helpful: http://www.redhatmagazine.com/2007/01/18/disk-encryption-in-fedora-past-pres...
On Tue, Jan 08, 2008, Marko A. Jennings wrote:
On Tue, January 8, 2008 9:14 am, Robert Moskowitz wrote:
<snip> > So what options do we have for encrypting partitions. <snip>
I found this article helpful: http://www.redhatmagazine.com/2007/01/18/disk-encryption-in-fedora-past-pres...
One could also set up a script that automatically sends an e-mail message when the laptop boots, and perhaps periodic e-mails from cron. This could provide at least the IP address from which the mail was sent which could help locate it.
Bill -- INTERNET: bill@celestial.com Bill Campbell; Celestial Software LLC URL: http://www.celestial.com/ PO Box 820; 6641 E. Mercer Way FAX: (206) 232-9186 Mercer Island, WA 98040-0820; (206) 236-1676
There is no worse tyranny than to force a man to pay for what he does not want merely because you think it would be good for him. -- Robert Heinlein
on 1/8/2008 11:00 AM Bill Campbell spake the following:
On Tue, Jan 08, 2008, Marko A. Jennings wrote:
On Tue, January 8, 2008 9:14 am, Robert Moskowitz wrote:
<snip> > So what options do we have for encrypting partitions. <snip>
I found this article helpful: http://www.redhatmagazine.com/2007/01/18/disk-encryption-in-fedora-past-pres...
One could also set up a script that automatically sends an e-mail message when the laptop boots, and perhaps periodic e-mails from cron. This could provide at least the IP address from which the mail was sent which could help locate it.
If I was in the business of stealing laptops, I would be looking at the system unconnected to the world so as to look for traps like this. Most laptops are stolen for the hardware value.
--On Tuesday, January 08, 2008 11:39 AM -0800 Scott Silva ssilva@sgvwater.com wrote:
One could also set up a script that automatically sends an e-mail message when the laptop boots, and perhaps periodic e-mails from cron. This could provide at least the IP address from which the mail was sent which could help locate it.
If I was in the business of stealing laptops, I would be looking at the system unconnected to the world so as to look for traps like this. Most laptops are stolen for the hardware value.
Which is why you want to send the message delayed after boot, not immediately. Don't holler for help until your kidnapper is out of the room or you know your rescuers will hear you.
A possibility is to piggyback your cry in an innocuous protocol. For example, a DNS lookup to a particular domain name.