Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello,

I have been infected by some ransonware i don`t know.

In the attached file is the readme file with the instructions to decrypt the files. Anyone knows the ransomware and how to decrypt it?

It seems a xorist one, but the tool by kaspersky doesn`t work.

Any information will be welcomed.
README_9670338_05489.txt
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE
LVL 5
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

New GrouHow to break encryption in WhatsApp?

The answer is Group Chat.

More is Less: On the End-to-End Security of Group Chats in
Signal, WhatsApp, and Threema

https://eprint.iacr.org/2017/713.pdf
0
We have a user that has a a 360gb TrueCrypt volume in his my documents.  The computer has the TC volume open up when the computer starts, every time .  However, when he logs out from his computer or when an apps or Windows is updated and required restart, the user never dismount the volume.  We understand that there is an option (and it is checked) in TC where it automatically dismounts its volumes when a user is logged-off (we assume also when shutting down), but what happens when the computer halts or "freezes" when there is no reactions from keyboard or mouse and the user is force to restart or power off the device?

There has been no complaints as to the TC volume until now - last night some files could not be found within the volume.

what happens to the TC volume when a forced restart without dismounting the volume?
0
Hi,

I have a connection issue to my openvpn (Synology) on Windows, but same config works fine on Android.
On server itself I don't find any log indicating what is going on.

Can you advise?

Openvpn config (tcp to be able to connect from behind firewall) works fine on Android, not on Windows:
allow-recursive-routing
ifconfig-nowarn
client
verb 4
connect-retry 2 300
resolv-retry 60
dev tun
remote mysite:myport tcp-client
auth-user-pass
<ca>
-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----

</ca>
<key>
-----BEGIN PRIVATE KEY-----
-----END PRIVATE KEY-----

</key>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----

</cert>
comp-lzo
route-ipv6 ::/0
route 0.0.0.0 0.0.0.0 vpn_gateway
dhcp-option DNS 8.8.8.8
dhcp-option DNS 8.8.4.4
dhcp-option DOMAIN blinkt.de
nobind
persist-tun
# persist-tun also enables pre resolving to avoid DNS resolve problem
preresolve
# Use system proxy setting
#management-query-proxy
# Custom configuration options
# You are on your on own here :)
# These options found in the config file do not map to config settings:
mute-replay-warnings 
ifconfig-nowarn 
resolv-retry infinite 

Open in new window

Connection log
Thu Jan 11 18:23:09 2018   pkcs11_cert_private = DISABLED
Thu Jan 11 18:23:09 2018   pkcs11_cert_private = DISABLED
Thu Jan 11 18:23:09 2018   pkcs11_cert_private = DISABLED
Thu Jan 11 18:23:09 2018   pkcs11_cert_private = DISABLED
Thu Jan 11 18:23:09 2018   pkcs11_pin_cache_period = -1
Thu Jan 11 18:23:09 2018   pkcs11_id =

Open in new window

0
Hello,
i read over google that i can decrypt the ssl and tls traffic with wireshark
so i use port mirriong on my router and route all traffic to wireshark it' will help ?
is there any way to do i t?
thanks.
0
Hi
I'm deploying sonicwall cert from a firewall to all my windows clients.
The certificate has been distributed by GPO.
I'm having a problem with java apps (idrack) which can't connect.
I've imported this to my java store but the same issue appeared.
Eventually I will need to distribute this to all my Win and Mac clients.
0
Would like to brainstorm: out there what are the controls/measures organizations put in place
when transferring/processing data (within same company) but across countries (which has
different laws & regulations) ?

So far, thought of the following:  pls add on or comment.  Certainly remove if there are
irrelevant ones.

Endpoint
-      Endpoint Encryption (if data flows to endpoint): what about data at rest??
-      USB lockdown

Gateway
-      Web Scanning
-      Email screening

Servers / DB
-      Database Activity Monitoring?  Is built-in DB audit trail sufficient or need
        DB activity monitoring tools like Imperva ?
-       Data masking of card# (for PCI-DSS)
-       Need DB encryption?

Transmission
-      Encryption of files (what are the standards?)
-      VPN / secure file transfers (is SSL/TLSV1.2 enough) ?

Non-disclosure agreement
-       Is there a need to sign NDA (for intra-company or this applies only to inter-company)

Is this treated as 'Outsourcing' if it's intra-company ?
0
There's a discussion internally within our corporate if it's a concern that an internal staff attempts to copy out
SAM & passwd  and then run a password cracking tool on it.

Q1:
Is this a valid concern?

Q2:
In DoD B2 (or is it C2), the file containing hashed passwd  'vanishes' : is the purpose to prevent someone from
copying out the hashes for cracking?  Or what's the purpose of doing this?

Q3:
What are the measures we can put in place to prevent internal staff from making cracking attempts on SAM
& a Unix file containing the hashed passwords?  Should stronger hash (what's the current best practice?)  or
encryption be used?
0
HI
I'm just implementing a DPI inspection and I've download a key from my sonicwall firewall.
This cert. has been distributed to my PC over GPO.
How do I distribute the same cert to my MAC clients  ??
0
Hi, I’m sure many of you are probably sick of answering this question, so apologies in advance.

I’ve been following (not trading) BitCoin for the last year. A few friends have invested in it, and i'd like to know more about it.

I'm interested investing in Ethereum in I have two questions:


01 - What is the best site to buy Ethereum from?

02 - How hard is it to get your money back out if you wanted to sell?

Any other advice would be greatly appreciated.
1
Cyber Threats to Small Businesses (Part 1)
Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Hi, I’m sure many of you are probably sick of answering this question, so apologies in advance.

I’ve been following (not trading) BitCoin for the last year. A few friends etc have invested in it, etc.

I have a few questions:

01 - I know this is hard to call, but I’m sure I’m too late to the BitCoin game, BUT are all crypto currencies the same in this regard or are some only worth very small now but could potentially explode like BitCoin?

02 - How do different things influence different crypto currencies, or are they all influenced by the same thing?
0
 
LVL 65

Expert Comment

by:btan
Suggest you consider asking these questions instead of putting these as post. Thanks.
0
 
LVL 12

Expert Comment

by:Andrew Leniart
@btan

Nice article for 101
https://blockgeeks.com/guides/what-is-cryptocurrency/


Great article! Thanks for posting that.
0
I have a windows program with the Markdown web server that uses a self-generated SSL certificate. I'm not the developer so I have no control over the SSL certificate generation.

But I notice that in the Program Files (86)/program-folder it has the spired.pem file with the private key and certificate (attached)

When I add a valid private key and a Let's Encrypt SSL certificate the web server stops responding.

Can someone guide me on how I could add a valid private key and certificate to the file?

Please note that the attached is a self-generated private key and certificate. I'm not sharing anything that needs to be kept private. It is useless to anyone else. I can regenerate anytime
0
We have laptops with proprietary data and network information that leave the office daily

Can someone tell me what is a good software to use to provide additional security to the laptops

Looking for additional authentication other then just the Windows logon
I would like the files\data on the laptop encrypted
0
Hell0 Experts

I recently installed a Cisco 1921 router as the def gateway for my network. I also have a Cisco ASA5505 9.2 on the LAN behind the router. My goal is to allow AnyConnect Client SSL, Clientless SSL and site to site VPN passthrough on the router. So far I had a chance to test Client SSL and Clientless SSL and my router configuration does not seem to be working. From the LAN I can establish a VPN session to the outside interface of the ASA. Can you please review my configuration and point me in the right direction?

C1921 Config:
Int G0/0
ip add x.x.x.99 255.255.255.252
ip nat outside
ip virtual-reassebly
!
Int Gi0/0.17
des ASA UPLINK - OUTSIDE
enc dot.1Q 17
ip add 172.17.0.2 255.255.255.252
!
Int Gi0/0.100
desc LAN
enc dot1Q17
ip add 192.168.1.2 255.255.255.0
!
ip access-list standard ACL-NAT
permit 192.168.1.0 0.0.0.255
permit 172.16.0.0 0.0.0.255
!
ip nat inside source static list ACL-NAT int gi0/0 overload
ip nat inside source static udp 192.168.0.1 500 x.x.x.99 500 extendable
ip nat inside source static udp 192.168.0.1 4500 x.x.x.99 4500 extendable
ip nat inside source static udp 192.168.0.1 1701 x.x.x.99 1701 extendable
ip nat inside source static tcp 192.168.0.1 1723 x.x.x.99 1723 extendable
ip nat inside source static tcp 192.168.0.1 443 x.x.x.99 443 extendable

ASA Config
int vlan 17
nameif outside
ip add 172.17.0.1 255.255.255.252
!
int vlan 100
nameif inside
ip add 192.168.1.1 255.255.255.0
!
route outside 0.0.0.0…
0
Hi,

I  just got this message, never seen this before:

backup encryption
What is it? Can we disable this? Is this important?
0
I'm working a project for a company that needs to insure that the documents and files stored on the hard drives of its executives are completely unreadable if any of the IT employees copy these files from the executives' hard drives to their own computers.

While only a few employees have domain admin access and would be able to do this in the first place we need to insure that if this is ever done that the files that are copied will be highly encrypted and won't be able to be read since this has already been done by former domain admins.

What kind of whole hard drive encryption software will do this?

Is this something that Symantec PGP whole hard drive encryption will do once the entire Windows 10 OS and hard drive of a computer is encrypted?
0
What is the best whole hard drive encryption program for Windows 10?

Would this be Symantec PGP or are their better alternatives?
0
Hi,

Bad situation. Daughter's iPhone was re-set to factory settings without a backup, neither icloud nor iTunes backup.

2 years of photos gone.

Is there any hope of recovering the photos from the device?

Any advice very welcome...
0
I am trying to re-image a laptop with a DVD that has the OS but the DVD player is new and external. The laptop that still has a previous image on it and has Pointsec as the encryption software. So when I select the DVD player to run it tell me there are no drivers. How can I get the DVD drivers installed since I do not have the old password to login to the laptop?
0
Put Machine Learning to Work--Protect Your Clients
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

hey guys, i have a Win 10 Pro machine with a TPM (1.2), and i am trying to setup bitlocker, i dont get an option though to setup a password, am i missing a step somewhere?
0
The Sonicwall OS is 5.x. This is just the base router, no extra licenses for IPS, malware etc... I recently setup L2TP VPN for a couple users - using long and complex Pre-shared secret and each have a very long and complex password... I have been blocking obvious attempts from just IP addresses trying to access a webcam port using the info I found on how to do that - but blocking an IP address from WAN  - doesn't seem to affect efforts of a couple outsiders trying to access via L2TP - I see the failed messages from the different stages... but they keep trying - and added their IPs to my 'Blocked IPs' address object group has no effect.
I want to be able to deny them access to even try to authenticate and get them out of the logs - like blocking IP addresses.
Anyone savvy on the SonicWALL as to how to prevent attempted L2TP connections from undesired sources? Is there a way to create access rules to block from L2TP to ANY or LAN, we have the network on the X0 interface.
My understanding is there is a VPN access list on the SonicWALL - but it does not apply to L2TP.
Thank you!
0
Hi all

Does it really save any purpose to encrypt a database (BE)with a password when some people are saying there are some free software out there that can break the encryption easily , I know for the FE we seam to be fine as long as we only give clients Accde files.

For queries I'm still using a special code to hide special keys( This is also an extra cover to FE objects), unless someone knows my backdoor hot key it will not be possible to unhide the queries.

Though strictly speaking the software is anchored on queries , VBA code  , macros and reports because even if one steal the tables with entity relation , how is it going to help without the treasured code???

Kindly educate me if I'm wrong!

Regards

Chris
0
Hi guys

We have backup types and all Eternal HDD are encrypted using BitLocker, now when I plug in one of the disks I have to login to the host and Unlock it. Is there any script or Method that I can setup to "When I connect one of the External HDD it will Automatilcy Unlock it using the password"  

Please could you help me to figure it out the script?

thank you
0
Hi,

I purchased a Samsung SSD with a new Dell Vostro 3000 Series Laptop.

When trying to clone the drive with either Acronis or Samsung Data Migration 3.1 I get a "cloning failed" and seems to point to the fact that the built-in 1TB 2.5" HDD is BitLocker encrypted.

BitLocker encryption is not enabled for the drive in Windows, but on Disk Manager is already shows "BitLocker encrypted".

How does one disable this BitLocker encryption if it is not enabled in Windows but shows that the drive is BitLocker encrypted?

Some Google searches pointed me in the direction of the built-in TPM Module which I have disabled in BIOS, but still no luck, the built-in HDD still shows "BitLocker encrypted" and cloning fails.

Thanks,
Reinhard
0
We have a user who heavily depends on Truecrypt (she uses the last known version prior the site leaving their users).  The size of the volumes range from 360gb  to 1 tb and have been using them since 2012 with no glitch whatsoever.  She changes the volumes password successfully every year.

Yesterday, a colleague told her that she has to have the keyfiles of each volume and even more, that right after creating all her volumes, she should have backed up those keyfiles - she has never done this.  We have search on this topic and effectively it does says it (see pix below).

 tc quest
Based on the above, 2 questions:

1. Is there any considerations or maintenance she should consider for her TC volumes?
    (this is because the user is constantly using the TC volumes, sometimes having them open for
    days even is she hibernate her computer, the TC volumes are open)

2. Since she never backed the header or keyfiles when creating TC, may there be some problem?
    Also should we do regarding this?


Thank you very  much in advance.
0

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.