7 Tools to Encrypt/Decrypt and Password Protect Files in Linux

If You Appreciate What We Do Here On TecMint, You Should Consider:

  1. Stay Connected to: Twitter | Facebook | Google Plus
  2. Subscribe to our email updates: Sign Up Now
  3. Use our Linode referral link if you plan to buy VPS (it starts at only $10/month).
  4. Support us via PayPal donate - Make a Donation
  5. Support us by purchasing our premium books in PDF format.
  6. Support us by taking our online Linux courses

We are thankful for your never ending support.

RedHat RHCE and RHCSA Certification Book
Linux Foundation LFCS and LFCE Certification Preparation Guide

You may also like...

11 Responses

  1. Rafael Rojas says:

    Hi. The 3rd tool, Ccrypt, has a typo, to decrypt a file it’s ccdecrypt instead decrypt

  2. OVVYYYXXXX says:

    Hey Ya people!

    This is funny.

    It should be different and way way different.

    How do we prevent somebody to copy files from our PC while we are on the Internet!

  3. Stephane says:

    Emacs users can also use EasyPG which allows to encrypt/decrypt files with the extension .gpg
    EasyPG can either use an existing GPG key or a standalone password (i.e. symmetric encryption).

    See also https://www.emacswiki.org/emacs/EasyPG

    • Ravi Saive says:

      @Stephane,

      Thanks for the tip about EasyPG tool, never heard of this too so far, will certainly give a try right away…

  4. Inversion says:

    That’s not 7 tools LOL.. You’re talking about integration using the same tools gezzzzzzzzzz

  5. Kyle Lewis says:

    The article refers to bcrypt as “a key derivation function.” This shows that the author has confused bcrypt the key derivation (hash) function with bcrypt the command-line encryption program. These are two different things.

    It is true that bcrypt the hash function has been found to have weaknesses of some concern. The author’s remarks about bcrypt being unsafe however do NOT apply to bcrypt the command-line encryption program.

    • Inversion says:

      Yeah the article is completely wrong. Stating 7 when they’re using integration which uses same tools. Bad article is you ask me.

  6. Alejandro Diaz says:

    Excellent collection, thank you very much .

  7. Giorgos says:

    Great collection!
    Thanks!!! :-)

    One useful addition, (at my opinion) is Veracrypt (Truecrypt successor).
    https://sourceforge.net/projects/veracrypt/

    Comes with an installer and it has a console and a gui version.
    Also with Windows and OSX versions.

  8. Rashid Samoo says:

    Dear All Author

    Kindly share the step by step for dual installation ( window 8 & fedora 21 ) with new architecture UEFI or Legacy mode, I buy new laptop and comes this new architecture Legacy mode * UEFI Mode,
    I am unable to boot both window as a Dual Boot. kindly share the tutorial from basic steps.

Got something to say? Join the discussion.

Your email address will not be published. Required fields are marked *

Join Over 300K+ Linux Users
  1. 177,942
  2. 8,310
  3. 37,548

Are you subscribed?