I am about to make a release for zuluCrypt and would appreciate if people could test it for me to see if i have missed anything.
Before you run below commands to download,build and install it,please make sure you have the following packages installed.
above are required,below is optional and it add support for kde kwallet( used for storing keys securely )
kde-devel( kde development files )
Just copy below commands and run them on the terminal to download the sources,build and install them.
To uninstall,just run "make uninstall" in the build folder as root user.
git clone https://firstname.lastname@example.org/p/zulucrypt/
mkdir build ; cd build
cmake -DCMAKE_INSTALL_PREFIX=/usr -DCMAKE_BUILD_TYPE=release . ..
su -c "make install"
zuluCrypt does what it always does.
It can create plain and luks volumes in both files and partitions.
It can open encrypted containers residing in both files and partitions.
It can save and restore luks header backups in both files and partitions.
It can encrypt stand alone files.
It can use "naked" keys,keys in keyfiles,a combination of "naked" key and key file,a gpg encrypted keyfile.
There is an additional too called zuluMount.
This tool is a mount tool,it does everything device notifier and other mounting tools do and them some.
Its additional features:
It asks a user to specify a mount folder and hence a user gets to decide where they prefer their partitions to be mounted.
It can mount and unmount plain type encrypted volumes( all tools as far as i know only deal with luks types volumes )
It shows more info about partitions and hence it can be used as an enhanced replacement for kdiskfree.
Will appreciate any input by those who mount their hard drives/dvd/cd using device notifier or any other tool to give it a try and share their findings.