Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi all,

I have been searching online for an answer for this question for a few days now with no luck and I am hopeful that someone here can answer it for me.

So, I have a Seagate Wireless Plus device that I encrypted using Bitlocker full disk/drive encryption. When I plug the drive into my desktop computer using a USB, I am required to enter the encryption key to access the drive. It works fine and I am happy with this.

However, I am wondering if the encryption extends to wireless access. In other words, if someone connects to the device while it is broadcasting its SSID (by default it does whenever it is powered up), would they be able to access the contents or would it be all a jumble to them?

Please note that I do not have any compatible wireless devices to test this on hence my reason for posting this question.

TIA
~Tala~
0
Threat Trends for MSPs to Watch
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Hi All,

After encrypting some laptops with DiskCryptor, they all seem to go into Automatic Repair for Windows 10. Can i format the machine and start again, or do i have to decrypt these?
0
Hi,

I created a self-signed certificate on my Windows 10 PC.

I then went to a specific folder (which is part of my Google Drive folder on my PC), Right-click, Properties, Advanced (under General TAB) and enabled encryption for the folder. It immediately changed the icon of the folder, so I can see that it is encrypted.

I then shared this encrypted folder with another Google Drive user. This other user can open files in this folder without any issue.

This tells me that when one uploads the encrypted files from the PC to Google Drive it is decrypted on the fly.

How come would this happen and how can one stop the files from being decrypted?

In a nut shell: I don't want to use a 3rd party to encrypt the files before it goes to Google Drive, I want to use my own self-signed certificate on my PC, have files encrypted, but they need to stay encrypted when uploaded to Google Drive.

Thanks,
Reinhard
0
ive been hit with a ransomware attack
I can still use the computer but all word docs have been encrypted
I can open docs but they are blank
is my only option paying or can I get these back?
they are requesting over £800
0
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard yourself from future ransomware attacks.
2
Trying to find an official Microsoft product to hash an entire drive in MD5 or SHA256.

CertUtil only works for individual files.
Get-FileHash only works for individual files.

I need something for an entire drive or set of directories and files.
0
Hey all, im looking to encrypt some laptops for work. Does W10 Home offer Bitlocker?
0
All of the sudden accessing my gmail accounts through Outlook 2016 gets "Your server does not support the connection encryption type you have specified.  Nothing changed on my PC at all.

- I can log into Gmail on the web
- I checked my gmail settings and they are correct - I am using POP3
- it affects all of my gmail accounts
- I have repaired office
- no other office problems are corrected



Thanks
David
0
Hi,

I have MSSQL 2008 R2 Server that I need to reset the master key on one of the DB.  However, I cannot find the password for the current master key.  In my research to find a solution, I have found that I should be able to use;

ALTER MASTER KEY REGENERATE WITH ENCRYPTION BY PASSWORD = 'Not real password'

But I need to use the FORCE option.  Which I am not for sure how to use with the above query statement.

If this is correct, how do I use the FORCE option?

Thanks
0
In trying to get scan to email working I was changing settings in the kyocera cs400ci printer and now locked myself out of the GUI as the SSL settings I set it to are wrong and browsers dont trust it.

I checked SSL and DES only (no 3DES or AES) and now all browsers say invalid/bad/unsupported ssl/tls etc.

Any ideas on how I can ignore any/all ssl warnings and still get to the gui?  force ssl is on so I cant use port80.
0
2017 Webroot Threat Report
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Hi All

I was asked to do simple Proof of concept on Oracle encryption on one of my Lab environment.

DB Version :11.2.03

THANKS
VINAY PALAPARTHY
0
Hi all,

Having being doing some extensive work around our public facing webservers we are now getting down to less known issues. Most of the work we have being doing was around Certificates and encrption. Following another recent scan we are still getting the saem result come up for most servers:

  • Strict-Transport-Security      
  • Content-Security-Policy      
  • Public-Key-Pins      
  • X-Frame-Options
  • X-XSS-Protection      
  • X-Content-Type-Options      
  • Referrer-Policy      

I have read a bit about them but its a bit over my head not having a web background. To mitigate these problems can someone tell me are these weaknesses linked to IIS or encryption. Knowing that would be a good start.
0
1
Hi There,

We have recently acquired a  new mail base and we need to sync the data over to our new server.
However we have encountered a problem where the passwords are encrypted.
There are 2 passwords, digest password: digestPassword = {SSHA}TWcg67eMGQn428d3dS4HbZJqytpFMkku182nLQ==
and encrypted password. I was given a key RSA-X.509 to decrypt it but unsure how to go about so.
Please could someone kindly advise as we have around 50k mailboxes to copy over.
Thanks
0
Hi,

I have some files/folders that were copied from a Mac and the files show up as being encrypted when extracted from a zip file.

I could not remove the encryption even after taking ownership.

Also, some windows computer can open the files and some cannot.

how can I fix this?

Thanks,
0
I have a .txt file containing a yahoo contacts list that looks to be purposely encoded incorrectly to obscure the contents of the file.

I'm no techie.  Is there a software or process that can be used to restore the proper encoding and reveal the contents of the file?
0
Experts,

I have a bucket called SRC.Jobs that I want to do a multipart encrypted upload to.   I have been told that I can't do this because the bucket has a period in the name.  Is there a way around this?  Changing the name will break a bunch of other processes.
0
Hello,

Does anyone know a way I can print a secure PDF file? when opened the file says it is (SECURED).

I know this means the PDF is encrypted and I know that I need the password to unlock the encryption but I am not looking at unlocking or making the PDF editable but rather just have the ability to print what I can view on screen? I tried copying the content out but this doesn't work either.
0
We had an old windows xp PC in our 2008 domain which was reformatted to windows7 and joined back to domain.
Now we found one of the profile's mydocuments is encrypted.outlook pst file is also located inside the same folder.
we are not able to recover that showing access denied.tried changing permission but not working.
any recommendations please.
0
Free Tool: Subnet Calculator
LVL 9
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

I have a domain with four domain controllers in place.
Two DCs have DES enabled - see key in HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\parameters\ - and two other where DES is not enabled.

I have a webapp that uses DES to allow Single Sign-on.

What I don't understand is the following issue:

when I use a PC and confirm the authenticating DC by issuing the command "set logonserver", this is a DC where DES is not enabled. However, I can still use DES. Using Klist I can see the following ticket being issued

Client: myuser @ my.domain.com
Server: HTTP/webserver.my.domain.com @ MY.DOMAIN.COM
KerbTicket Encryption Type: Kerberos DES-CBC-MD5
Ticket Flags 0x40a10000 -> forwardable renewable pre_authent name_canonicalize
Start Time: 6/30/2017 11:49:57 (local)
End Time:   6/30/2017 20:03:26 (local)
Renew Time: 7/7/2017 10:03:26 (local)
Session Key Type: Kerberos DES-CBC-MD5

How is that possible ? Is it possible that despite being authenticated by one DC (where DES is disabled), this kerberos ticket is issued by a different DC (where DES is enabled) ?

Thanks for any input.
0
Today's update on Petya
Previously, it was believed that the ransomware would not begin encrypting until an hour after the initial infection. It is now been discovered that it begins encrypting the first 1MB of the below file types upon infection. Therefore turning off your device when viewing the reboot message, will not stop encryption.

It is also now being disputed if the goal of this attack was to collect Bitcoin or cause mass destruction in the devices it infects.

Files types:
.3ds .7z .accdb .ai .asp .aspx .avhd .back .bak .c .cfg .conf .cpp .cs .ctl .dbf .disk .djvu .doc .docx .dwg .eml .fdb .gz .h .hdd .kdbx .mail .mdb .msg .nrg .ora .ost .ova .ovf .pdf .php .pmf .ppt .pptx .pst .pvi .py .pyc .rar .rtf .sln .sql .tar .vbox .vbs .vcb .vdi .vfd .vmc .vmdk .vmsd .vmx .vsdx .vsv .work .xls .xlsx .xvd .zip
6
Which program is a good program for encrypting a portable external drive.
Are there any free programs?
Thanks Tony D
0
If I dont have a Windows server What program can I use to create a private and public key for use.
also whats best for secure email?
Thanks Tony D
0
Update on Petya Attack
As noted by our on-site expert, krakatoa, the current vaccine for Petya involves creating a file called perfc in the C://Windows folder and making it read only.  No kill-switch has been discovered, only a local vaccine.  
If you see the reboot notification below, your device has been infected. Turn off your device to prevent future encryption. Petya begins encrypting the device an hour after the initial infection.
**Update: Petya begins encrypting your the first 1MB of your files prior to the reboot. See new post for the updated information. **petyareboot.JPG
6
 

Expert Comment

by:Phillip Monk
.dat
1
 
LVL 9

Author Comment

by:Experts Exchange
According to our knowledge, file extensions .dat and .dll for perfc. Check out this article for more info!
0
What are my encryption options (hardware and software) for Thinkpad laptops specifically T540p and T560s models. We would prefer hardware encryption but open to ideas if there are better options. Thank you in advance for any input!
0

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.