Hey guys thanks for entertaining this linux newbie. I am sage on Windows and write it all, but in this forum I am a tadpole at best. LOL!! OK so I am working on configuring a linux OS as many of you know. Going great. Installed some nice programs and the speed is awesome. I know I am going to have to rebuild but I don't care because its fun. The only time crunch is the one I place upon myself. Here we go: Because of my needs I MUST have a fully encrypted laptop to carry around with me. I have downloaded the 12.04.3 alternate and have read through the process so I mostly get it. I am torn between Dm with LUKS and the older AES approach. I am leaning towards DM Crypt + LUKS and I will encrypt everything. I plan on placing /boot on a removable but bootable media so the laptop itself will be 100% encrypted while the linux OS is dismounted. That process is nothing too new since I have done it with TrueCrypt, PGP, and several other WDE products. Again, many years with this stuff on windows. Passwords: Just to be crystal clear on this if you can report some experiences to me. I create 25-40 character strong passwords and I don't mind keying such when I need to boot the OS. That is what I do with my windows WDE stuff. Using DM-Crypt is it possible to use a long password BUT when the OS asks for root authentication during updates, etc.... can you simply use an Admin user password that would be much shorter? I wouldn't want this shorter password to be available until the OS was mounted with the strong PBA password initially. I hope this question makes some sense.