On Saturday 22 September 2007 05:04, Carlos E. R. wrote:
The Friday 2007-09-21 at 12:08 -0700, Kai Ponte wrote:
What do I need to do?
Simple: create an encrypted partition (ext3, reiser, xfs) using Yast. Tell it to mount using ID (in fstab options, perhaps). Better use a loooooooong password.
Ahh, I missed using the ID in fstab options. I saw it but didn't try anything.
(Note: I do not want to resort to the CLI to mount it.)
AFAIK, no way. Sorry.
As it is usb mounted, you can not use /etc/cryptotab to mount it during boot, but fstab. And as you need to enter a password, you can not use a GUI unless somebody writes it first. I'm not aware in any not interested in finding it :-P
And things are a bit different in 10.3, I hear.
Hmm...maybe I'll put 10.3 on the laptop then. I do need to redo my partitions anyway, so that might be a good time. I'd want to simply put the key in and have it pop up with the unencrypted partition (as it does) and then ask for my password for the encrypted one. It would seem that's the obvious method of using such things. This has been a real challenge. I'm suprised at the lack of robustness in the GUI for such things. Even TrueCrypt has a GUI for Wintendo but I have to downgrade to 1980's-era CLI for the Linux version. :( Thanks for your tips! -- kai ponte www.perfectreign.com -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org