Hello, Hoodies!
We have 3 weeks left in 2022! 🥳
Here’s the breakdown of our Year End offers right now:
Network+ Challenge
Get your Network+ by the end of the year and get a FREE YEAR to the stack!
If you already paid for a full year up front (thank you!) I’ll give you a free custom hoodie.
Bootcamp Seat Giveaway
On Christmas Day, I’ll be selecting one random paid subscriber to the stack to win a FREE seat in Cohort 2 of the Zero to Hoodie Cybersecurity Bootcamp!
Every dollar you spend on the substack is a chance to win so upgrade to a PAID HOODIE in the STACK today:
Cohort 2 of the Zero to Hoodie Cybersecuirty Bootcamp!
This is my pride and joy!
Where the BULK of my time goes.
If you’re SERIOUS about starting your cybersecurity career in 2023 and you have the means, there’s absolutely no better product on the market. Period.
Live + recorded lectures
Live weekly Q&As
1v1 mentor meetings every month
24x7 discord access
With our mentorship, we’ll give you THE BEST possible roadmap and course of action FOR YOU to MAXIMIZE your entry into the marketplace.
And if you sign up today, you’ll get an ADDITIONAL 3 WEEKS of mentorship!
That’s an extra 20% of the bootcamp FOR FREE.
This is my thank you for supporting me early and often.
You can wait till New Year’s Day to buy but you’ll miss out on a lot of FREE time (if seats are even still available).
Seats are going FAST and space is limited!
The choice is yours.
Cohort 2 starts January 2nd.
Use discount code “10K” at checkout for $2,000 off!
Now let’s dive into today’s topic.
A guest post!
As always, this is for educational purposes only, and BE CAREFUL when running commands from the terminal on your machines!
Let’s dive in!
A Practical Guide to File Encryption
The last post was a brief introduction to what encryption is. This post will present the tools at our disposal to actually encrypt files.
Since all operations will be carried out on the terminal we will make extensive use of Cyber’s post about bash, make sure to read that one first from A to Z so you can actually implement this material (it’ll also work on Mac). Reading the posts about backups and password managers is also advised.
We will be using five tools for file encryption: GPG, Age, Openssl, VeraCrypt and Apple Macintosh’s built-in disk image creation. There are others, but those are more than enough. We will do symmetric encryption first, then public-key encryption. So, without further ado… leggo!