BTW, I think you can simplify test_parse. For example, you write "if (*argn +
2 < argc ...)" many times, but it should be possible to test this condition
only once per loop.
Optimised. Perhaps compiler optimised this anyway but it made code more
readable
Regards,
Okuji
__
On Wed, 15 Apr 2009 18:25:27 +0200
phcoder wrote:
> Michael Gorven has already implemented LUKS support for grub2.
^
really nice to know. But does it still required /boot partition as un-encrypted
?
>Using
> truecrypt with linu
J. Bakshi wrote:
On Wed, 15 Apr 2009 18:25:27 +0200
phcoder wrote:
Michael Gorven has already implemented LUKS support for grub2.
^
really nice to know. But does it still required /boot partition as un-encrypted
?
It's already
On Thursday 16 April 2009 18:27:33 phcoder wrote:
> Why don't you help us with that? Install truecrypt, dump mbr and mbr
> gap. Disassemble mbr and send an explanation of what it does in plain
> english here
There seems to be a decent specification[1] of the TrueCrypt format on their
website. It
Is there any info about the truecrypt booting process too? This is more
important than being able to read truecrypted files because I don't
think that anyone wants to boot linux from truecrypt when luks is
faster, better integrated and provides similar set of features
I don't see it on the link
Correct.
Stronger encryption is offered by loop-aes [1], and it also has a
simper on-disk format.
The main problem an encryption solution should address is where the
keys are stored.
A password only based encryption is considered weak.
Placing the keys on external media, such as USB Mass storag