Solved

Linux: What's as easy to use as "vi -x" but more secure?

Posted on 2011-09-22
2
308 Views
Last Modified: 2012-05-12
I've been using vi -x forever to encrypt files.  I was reminded the encryption with this is not so hot.  It's just soo convenient.  What would be a more secure method of encrypting when using vi and just as easy?  Thanks.
0
Comment
Question by:amigan_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Accepted Solution

by:
vaska94 earned 500 total points
ID: 36583717
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 36601584
Thanks.  I was looking for something I could do in a single step as with "vi -x filename".  I am familiar with GPG and guess that will have to do.  Thanks.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Best in class privacy policy 6 86
Fraud Email 11 73
GPO denied - but why ? 6 57
Installing security patches for Windows 7 - JUST the security patches 6 45
OnPage: Incident management and secure messaging on your smartphone
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question