Thank You for Your time and answer, Wolodja: > http://smcv.pseudorandom.co.uk/2008/09/cryptroot/ > http://linuxgazette.net/140/kapil.html I will take a look at it. > I followed the second approach and am very happy with it. If these > approaches do not cover your usecase you might want to desribe your > objectives in more detail. Please, look at my another post - answer to Mike.