Encryption

6K

Solutions

55

Articles & Videos

7K

Contributors

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Refine results

Q1:
What are the most secure factors to consider when doing the above?  IPsec with 3Des?

Q2:
Symmetric or Asymmetric?

Q3:
If we're using Telco's VPN via Internet pipes, the VPN (ie encryption…

322 views
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Hello,
I have a laptop that's hard drive has been encrypted with McAfee.  Getting past this encryption is not a problem!  I have the login information and can get past McAfee.  But, the next login is…

721 views

This is a new one for me... My client, who is computer illiterate, downloaded a file from FilesAnywhere that he had previously uploaded.  He says that all of a sudden the desktop went haywire and his …

820 views

Encrypting:
(CODE)

Decrypting:
(CODE)

In this process the metadata of the file has been changed. The created date is no longer the original value, and so on. Is there any way to preserve this …

414 views

Background:
- I have limited information/skills in this area.
- I have forgotten the password
There are lots of solution in YouTube. Using one and executing:
(CODE)
produced what you see on the…

535 views

ipsec tunnel comme not up

Router HP comware router

Config remote site :
----------------------------
IKE phase1
  encryption des
  authen MD5
  diffie-hellman group Group2 1024bit
  renego…

1026 views

A client of mine uses QuickBooks Premier Edition of Manufacturing and Wholesale. It is Registered with 3 seats. Her last good backup of her Windows Server 2008 R2 was on Friday, October 28th at 11:30p…

768 views

Hello experts,

I've an application built on VB.NET and it's using Oracle DB.  The application was in use since couple of year and database have records in it.

I like to encrypt few sensitive da…

1265 views

Hi experts,

What are there some solutions for encryption of data at rest (cost effective) besides bitlocker.

631 views

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.

091 views
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

I need to read the docx file, in char array, (c++) to perform AES encryption on it. One idea I got from somebody else, was to actually access the header of docx file, and encrypt that header, instead …

1760 views

Anyone have some good resources and basic tutorials on how to encrypt a mysql database at rest and access it via PHP?

851 views

We have a need to take out a list of customers' names, credit card# &  PII (Personally Identfble Info)
to a Lucky Draw event to validate customers identity who won the lucky draw when the customers

744 views

I looking into disabling TLS 1.0 and 1.1 on our public IIS web servers but want a way to warn users that are running browser clients that don't support TLS 1.2. I was hoping IIS would have a way to re…

347 views

Refer to attached sql script which my DBA colleague plan to use to
"mask" sensitive data in the DB (I presume it's Oracle).

Q1:
Is this a 1-way hashing or the 'masked' data can be 'unhashed' back…

26104 views

When scanning various banks online sites from https://www.ssllabs.com/ssltest/  ,
the result indicates they are still using TLSv1.0  (besides 1.1 & 1.2) :

https://internet-banking.dbs.com.sg/IB/We…

559 views

We have huge amt of data in our AIX & Solaris servers to send to our offsite
vendor & don't want to install software (eg: Truecrypt) on the servers : LTO
tapes are not an option as we no longer use …

1145 views

I have an old external hard drive where I put the label "password fails" a few years ago. When I enter a password that's clearly wrong, the click Unlock, the window shake side to side. When I enter th…

1693 views

Hi,

WHat is the best way to create strong certificates for IIS servers.  The default values IIS provides is not acceptable.  Or can i use openssl on windows too or is there a better tool?

533 views
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

I used to put passwords into a hidden and encrypted file in cygwin. But now it looks like the -x option for vim gives a warning itself that it's not very secure. Plus I have not been able to resolve a…

21164 views

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather…

082 views

I am using Windows 7 Enterprise globally in my enterprise and Windows Server 2012 managing via AD and GPO's.
I want to enable Bitlocker to go to ensure portable storage devices are encrypted on usage…

251 views

I want to know if it is possible, and how, to use C# to extract publick keys from pfx files without a password. I understand the password is there to protect the private key, so the public keys should…

291 views

Hello EE, I need to figure out a way to remotely enable TPM for the prep work of settings up BitLocker on a bunch of remote Dell Latitude Laptops.

About 6 different models, and I am certain the BIO…

491 views

Refer to attached article.

Besides reading the product manual, is there any way I can verify if my
products has Blowfish enabled & if TwoFish is supported?

Some of encryption tools we use are C…

560 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (22,945)
  2. OS Security
    (21,449)
  3. SSL / HTTPS
    (8,012)
  4. Exchange
    (195,944)
  5. IPsec
    (5,867)
  6. Windows 7
    (44,624)
  7. Windows Server 2008
    (82,321)
  8. Windows XP
    (118,250)
  9. Windows Server 2003
    (128,510)
  10. Anti-Virus Apps
    (22,108)