Explore Encryption on Experts Exchange

Expert Solutions for Your Tech Problems

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the ...

Read more
  • 8.2K Content
  • 4.6K Contributors

Expert Spotlight
Senior Data Analyst

Veteran in computer systems, malware removal and ransomware topics.  I have been working in the field since 1985.

Article

Multiple Email Addresses To Address A Need

1
For several years now I have been using multiple e-mail addresses to both organize and compartmentalize my e-mail. I have found several tricks worth sharing ...
Article
Azure AD B2C Custom Policies

Using Azure AD B2C Custom Policies

During this post, you will learn about custom policies, one of two sign-in options provided by an Azure AD B2C tenant (the other is user flows). Custom Policies allow us to create unique authentication methods based on our requirements.
Article

Encryption in VBA using the Microsoft NG Cryptography (CNG) API

This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA. In this part: Encryption.
Article

Hashing in VBA using the Microsoft NG Cryptography (CNG) API

This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA. In this part: Hashing.
Article

Storing encrypted data in Microsoft Access

This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA. In this part: Storing hashed or encrypted data.
Article

Storing passwords in VBA using the Microsoft NG Cryptography (CNG) API

This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA. In this part: Handling passwords.
Article

Utilise Microsoft's Next Generation Cryptography (CNG) API in VBA

2
This article series will show you how to utilise the Next Generation Cryptography (CNG) API from Microsoft for modern hashing and encrypting/decrypting in VBA. In this part: Compatible with other environments.
Article

Internet Explorer and Secure HTTP Don't Mix

Microsoft Internet Explorer prior to version 11 does not support modern encryption. A client connecting to a properly-configured modern web server, claiming to be Internet Explorer with a version prior to 11, is actually a robot spoofing its browser identification and should be blocked.
Article
Screenshot of Hyper-V Settings

Using Bitlocker to encrypt virtual machines

This is another small article in my Bitlocker article series. It is about encrypting virtual machines. The scenario that I am securing the VM against, is that an attacker has physical access to the host and is trying to read out the virtual hard drive of the guest systems.
Article
We have bitlocker ...so we need MBAM, too?

We have bitlocker ...so we need MBAM, too?

In this article, I will take a look at Microsoft Bitlocker Administration and Monitoring (“MBAM”) and conclude, why I prefer my own scripts for deployment and management.
Article
Standalone RD Gateway Server without RDS Infrastructure

Standalone RD Gateway Server without RDS Infrastructure

byMahesh
In this article, will demonstrate how to deploy standalone RD gateway server on 2012 R2 server without deploying RDS infrastructure. RD Gateway is a built-in windows server role and allows RDP to internal servers from the internet through the Https tunnel.
Article

Bitlocker and multi-booting

If you are asking yourself "will Bitlocker allow me to install several encrypted instances of windows 10 on the same drive?", here is your answer.
Article

How to manually pre-provision Bitlocker

1
This is yet another bitlocker article. I will cover only a very small aspect: the pre-provisioning process. Without getting technical, this process means “turning on bitlocker before anything else”.
Article
How to use Bitlocker on Windows 10 Home

How to use Bitlocker on Windows 10 Home

9
This is a quick tutorial that will show you how to use Bitlocker in case you feel a need to use it, even on Windows 10 Home
Article

5 crazy windows security problems that are homemade

If someone asked you: "what is the single dumbest thing Microsoft has ever done?", what would you answer? Since I am mainly an IT security guy, here is my answer from a security perspective.
Article

How to create a file-based bitlocker protector for recovery and support purposes

Those who administer bitlocked networks with pre-boot authentication know how unpleasant it can get if you would like to start a device in the absence of the user. I will remind you of a well-known way that lets you boot up and/or recover these machines at ease and help you to use it safely.
Article

Simple Reversible Encryption for VBScripts

5
Leaving sensitive information (like passwords) in clear text scripts is never a good practice, though it's sometimes unavoidable. This set of VBScript functions can be used to obscure critical information making it at least a little more difficult for curious eyes (or worse) to see.
Article

Tokenization vs Encryption:  Learn Differences Between Both

This article covers an all-important comparison between Tokenization vs Encryption. Also, read about What Tokenization & Encryption is in detail. Both technologies are used for Cloud data security to prevent cyber crimes.
Article
Getty-Security

What is Convergent Encryption?

In this article, I explain what Convergent Encryption is and how it can be used.
Article

Blockchain: Beyond Cryptocurrency

In this interview with the head of client strategy for blockchain developer Very, we take a look inside the growing popularity of blockchain development and how this technology can make an impact beyond Bitcoin.

Do more with Experts Exchange.


Get Answers

Join a Group Discussion

Collaborate

Monitor your Site

Explore solutions and more