• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer navigation

The Geek Diary

  • OS
    • Linux
    • CentOS/RHEL
    • VCS
  • Interview Questions
  • Database
    • MariaDB
  • DevOps
    • Docker
    • Shell Scripting
  • Big Data
    • Hadoop
    • Cloudera
    • Hortonworks HDP

tomb Command Examples in Linux

by Deepika

Tomb is a free and open-source tool for managing encrypted storage directories on Linux systems. It allows users to create secure and portable storage containers that can be safely transported and hidden within a filesystem.

Using Tomb, users can create encrypted storage directories that are protected by a passphrase. These directories can be hidden within a filesystem, making them difficult to detect or access by unauthorized users. The encrypted storage directories can be mounted and unmounted like any other file system, allowing users to store and access sensitive data securely.

Tomb provides several features to enhance the security and usability of encrypted storage directories. For example, it supports the creation of hidden volumes within encrypted containers, allowing users to create decoy directories that can be used to deceive attackers. Tomb also allows users to specify various parameters such as key sizes, encryption algorithms, and hash functions to further customize the security of the encrypted storage directories.

Tomb is designed to be easy to use and requires minimal technical expertise. The tool comes with a command-line interface that allows users to create, mount, and manage encrypted storage directories quickly. Additionally, Tomb provides a GUI front-end called “Nautilus Tomb” that integrates seamlessly with the GNOME desktop environment.

Overall, Tomb is a powerful tool for managing encrypted storage directories on Linux systems. Its robust encryption and security features, coupled with its ease of use, make it a popular choice among privacy-conscious users who need to protect their sensitive data.

tomb Command Examples

1. Create a new tomb with an initial size of 100 MB:

# tomb dig -s 100 encrypted_directory.tomb

2. Create a new key file that can be used to lock a tomb; user will be prompted for a password for the key:

# tomb forge encrypted_directory.tomb.key

3. Forcefully create a new key, even if the tomb isn’t allowing key forging (due to swap):

# tomb forge encrypted_directory.tomb.key -f

4. Initialize and lock an empty tomb using a key made with `forge`:

# tomb lock encrypted_directory.tomb -k encrypted_directory.tomb.key

5. Mount a tomb (by default in `/media`) using its key, making it usable as a regular filesystem directory:

# tomb open encrypted_directory.tomb -k encrypted_directory.tomb.key

6. Close a tomb (fails if the tomb is being used by a process):

# tomb close encrypted_directory.tomb

7. Forcefully close all open tombs, killing any applications using them:

# tomb slam all

8. List all open tombs:

# tomb list

Summary

Overall, Tomb is a powerful tool for managing encrypted storage directories on Linux systems. Its robust encryption and security features, coupled with its ease of use, make it a popular choice among privacy-conscious users who need to protect their sensitive data.

Filed Under: Linux

Some more articles you might also be interested in …

  1. How to use shell expansions for generating shell tokens under Linux
  2. urxvt: command not found
  3. Medusa Command Examples in Linux
  4. df Command Examples in Linux
  5. lcov: command not found
  6. netselect: command not found
  7. find: command not found
  8. Linux File/Directory Permissions cheat sheet
  9. gnome-calculator: command not found
  10. cloudflared: Command-line tool to create a persistent connection to the Cloudflare network

You May Also Like

Primary Sidebar

Recent Posts

  • Vanilla OS 2 Released: A New Era for Linux Enthusiasts
  • mk Command Examples
  • mixxx Command Examples
  • mix Command Examples

© 2025 · The Geek Diary

  • Archives
  • Contact Us
  • Copyright