Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi team,

I recently created a plain gmail account. I tried to send 500 in one time from my personal iMac and it went through.
Although, my colleage tried to sen 200 emails in one time but unfortunately didn't go through.
There is a message says "....don't support encryption."
I suppose it means that this account is not using TSL.

Is there a way to fix this issue, so I can have the ability to send so many emails without this warning?

Thanks you,
Free Tool: SSL Checker
LVL 12
Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

I need to be able to encrypt PDF documents in VFP programatically and then create a zip file with the encrypted PDF to email

Please assist.

Hello, I have just recently taken over IT Support for a couple of small education schools. GPDR is kicking in very soon and I just wonder how this affects the I.T. in terms of encryption i.e. Office 365 emails or emails in general, USB sticks, logging into PCs, ipads, antivirus, backups etc, etc

Does the GPDR state that EVERYTHING has to be encrypted i.e. PC\laptop hard drives or just confidential data onsite and data that is going offsite, do all USB sticks need to be encrypted ? Data on the server does this need to be encrypted i.e. word and excel files, what is the rule regarding these areas please ? It's a minefield.

Any help would be most grateful,

Thanks guys.
Public Sub EncryptFile(ByVal tmpAttFile As String, ByVal tmpPass As String, ByVal tmpText As String)
            Dim wrapper As New Simple3Des(tmpPass)
            Dim cipherText As String = wrapper.EncryptData(tmpText)
            My.Computer.FileSystem.WriteAllText(Path_SendFile & tmpAttFile, tmpText, False)
        Catch ex As Exception
            MsgBox("Proses Create File dan Encrypsi Gagal. Harap Close Dahulu Modul Transaksi", MsgBoxStyle.Information, "Error")
        End Try
    End Sub

Public NotInheritable Class Simple3Des
        Private TripleDes As New TripleDESCryptoServiceProvider

        Private Function TruncateHash(
        ByVal key As String,
        ByVal length As Integer) As Byte()

            Dim sha1 As New SHA1CryptoServiceProvider

            ' Hash the key.
            Dim keyBytes() As Byte =
            Dim hash() As Byte = sha1.ComputeHash(keyBytes)

            ' Truncate or pad the hash.
            ReDim Preserve hash(length - 1)
            Return hash
        End Function

        Sub New(ByVal key As String)
            ' Initialize the crypto provider.
            TripleDes.Key = TruncateHash(key, TripleDes.KeySize \ 8)
            TripleDes.IV = TruncateHash("", TripleDes.BlockSize \ 8)
        End Sub

Public Function EncryptData(
    ByVal plaintext As String) As String

            ' Convert the plaintext string to a byte array.

Open in new window

I imagine encrypting server drives would slow down RAID. But what happens if a drive fails and needs to be replaced?
Will the encryption allow hard drive replacement?
Are there any other problems with encrypting Windows servers?
I'm disabling USB ports for my team in order to tighten things up and help improve/prevent DLP, and meet some requirements that are being externally driven by our customers

Just curious what the preferred method is of instructing them how to work without flash drives going forward. IE emailing things to themselves

Or what happens if you're at a conference and there's an issue with accessing your email or the corporate network, and you need access to the particular file but cannot because the USB ports are now disabled and you couldn't bring a backup copy

Was doing some research online and couldn't find anything. Thoughts?
O365 Exchange Hybrid

Sender and recipient are on the same tennant, both mailboxes are online.
Using transport rule on Ex online to Encrypt message.

Outlook 2016 doesnt decrypt automatically, instead i get a link to authenticate and opent via browser...
I received a warning of RDP as following,

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.
|-Subject             : CN=PBVA01
|-Signature Algorithm : SHA-1 With RSA Encryption

I want to confirm the signature algorithm used by RDP, so where can I check the certificate and the signature algorithm of RDP? Thanks.
I attach files  (original and encrypted).
My files say: email-blackdragon43@yahoo.com.ver-CL
Need to get rid of  these last 2 weak ciphers.  Apache on solaris

cipher check failure :



sslciphersuite line:



SSLProtocol all -SSLv3 -TLSv1 -TLSv1.2
Train for your Pen Testing Engineer Certification
LVL 12
Train for your Pen Testing Engineer Certification

Enroll today in this bundle of courses to gain experience in the logistics of pen testing, Linux fundamentals, vulnerability assessments, detecting live systems, and more! This series, valued at $3,000, is free for Premium members, Team Accounts, and Qualified Experts.

We have a user that password-protect a lots of his documents.  He uses WinRar v3.61 (and latest WinRar) , WinZip v9 (and the latest) also uses the latest 7z,  In a meeting a colleague mention that the problem with these apps, though all uses AES-256 (except the old version of WinRar),  when unzipping the files, all the apps create an unprotected version of the contents on another area of the computer.  What is the exact location of these folders?

We have a lot of documents that contain sensitive data.  I am looking for a good tool such as PGP to encrypt them with a password.  

Does anyone has a recommendation of an easy-to-use good one?  Something which is not too expensive or free will be great.  

Please advise.

I need to decrypt 4 files. files of type FAIRYTAIL. with the help of this program I did not work because I do not know perfect English. I ask for help very sroncho necessary.

recently in my environment was put a new subordinate CA with SHA2. I need remove old sub CA with sha1. But i don't know wich impact that maybe happen with the clients. I know that CDP and AIA make reference from old CA. I can change this referente for new sub-Ca? with steps i need do for complete this task ?
Spring SAML security: I need assistance to separate saml authentication with granting authorities. After authenticating against AD, I need to execute a web service call to retrieve user roles , prompt the user to select a role atnd then grant authorities to the user based on the role selected.
How do I go about achieving this?
Hi there,

I was wondering if anyone had every moved key's from one RSA Key Management Server to another i.e. if you had 2 or 3 KMS servers and wanted to consolidate things to just one KMS server?  If so, how did you do it?

Kind Regards
AD Certificate service will not start on an SBS server. Errors include "Keyset does not exist 0x80090016" and AD Certificate services terminated with service specific error 2146893802. Using certutil I can see that two keys exist - one that expired in 2016 fails the encryption test. The other, recently created passes signature test. When running the CA MMC I get no results because the service is not running. Keys can be seen in IE certificate properties. I am unable to delete the expired key command failed 0x800706ba the RPC server is unavailable. Security on C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys is correct. Tried esentutl. Shows clean shutdown. Tried bot a recovery and a repair but neither has helped. I don't seem to be having any certificate problems but I do want to migrate away from SBS to standalone Exchange and S2016 and I expect this certificate issue will cause problems. Don't have any suitable backups of the certificates.
EFS - Encryption file system.
why i am getting this error when i try to encrypt a folder on a  mapped drive (File Server). Does EFS has limitation for encrypting on remote folder? This folder is on a file server network, same IP network and folder is share. All servers are running Windows 2012 R2, and windows 8.1 Pro,Errorwhat i can do to resolve this?
Client has Exchange 2016 server on LAN and HUB server in DMZ. they use ZixGateway for email encryption. Senders to their domain are randomly receiving Delivery Delay messages or emails not getting delivered- Remote server returned '400 4.4.7 Message delayed'.
When the number of accepting connections is changed- the client begins to get either less warning event logs and more error messages from Zix sent via email, or less error messages from Zix and more warnings in the event viewer. this all varies on the number of connections increased or reduced.
Free Tool: Subnet Calculator
LVL 12
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

We (My Boss and I) are assessing the security  of Excel password protection for Microsoft Excel 2016 versus complete end to end encryption via something like OpenPGP.  We currently send files via email using Excel workbook (not sheets) encryption.  Can any one please comment on how secure Excel encryption is and the methods of circumventing Excel encryption for the purposes of demonstration for my boss.  I have found links indicating how easy it is to break, are the contributors correct?  - Thanks in advance.

Kind regards,
I get the error when attempting to access my internal device"

Error in Mozilla Firefox Ver. 57.0.4
An error occurred during a connection to 192.XXX.XXX.XXX. Cannot communicate securely with peer: no common encryption algorithm(s). Error code: SSL_ERROR_NO_CYPHER_OVERLAP

All other browsers same result
I had this question after viewing SHA 224 on excel.

I started to program/build an Excel template with a plain sight SQL Connection String within its VBA Code, but now I need to learn how to use a hash to hide its ID and Password. However, I do not know the required steps to make it work within VBA Excel: Should I store the hash somewhere else?, Should I compare that hash with the one inside the VBA?, and the most important step how to make a query and the SQL will recognize the true Password if in the Excel VBA code is only the hash string? Can somebody elaborate on how to do that in my VBA Excel/SQL Server situation?  On the other hand, this VBA code in the post looks fantastic, and I have found it on several other sites, but the Function Nz(sMessage, "") stops the run in error since it is nowhere to be found within this code. Please, SMEs help is really appreciated.

I have a windows program with the Markdown web server that uses a self-generated SSL certificate. I'm not the developer so I have no control over the SSL certificate generation.

But I notice that in the Program Files (86)/program-folder it has the spired.pem file with the private key and certificate (attached)

When I add a valid private key and a Let's Encrypt SSL certificate the web server stops responding.

Can someone guide me on how I could add a valid private key and certificate to the file?

Please note that the attached is a self-generated private key and certificate. I'm not sharing anything that needs to be kept private. It is useless to anyone else. I can regenerate anytime
1. Customer: Health Care Industry (Hospice) - so we need HIPPA Compliance
2. 7 Locations throughout 2 States.
3. About 70 email users.

1. Customer wants secure end-to-end email encryption
2. All email stored and accessible from central control panel -- even if the USER decides to delete their "copy."

1. A single account for each of the seven locations that would be their end-to-end encrypted email
       -- I thought of www.ProtonMail.com   - any comments on this?

2. All other accounts are with GoDaddy Email Hosting -- maybe just make sure they are sending / receiving through SSL / TLS, and that they understand NOT TO SEND patient data using that email address?
       -- Was going to ask GoDaddy about a central "copy" service.
       -- ...or do I need to just configure a machine here at the central office to download everything each day or so?

- Dasher
I need to ensure WEP is disabled.  I see the following, "security static-wep-key authentication open" and they are telling me that WEP is disabled.  Are they right?

I see the following command " ip telnet comport enable".  I need telnet disabled.  They are saying it is.  Are they right?

In the olden days, you could disable VTY and disable telnet.  I want SSH only.  Can you help here?

How do I tell the difference between SSH V1 and V2?  I see nothing stated in the configuration so I am assuming V1.  Thoughts?

FIPS 140-2 - They are telling me that FIPS 140-2 encryption is enabled, but I see nothing in the configuration to prove that.  I am very suspicious.

They said they disabled SNMP V1 and V2.  What do I look for in the evidence?  I just see SNMP and no characteristics of V3 such as authentication.

I am also told that the AP has no configuration - that everything is done on the switch now.

Maybe things have updated since I've done the work in the past, but I am highly suspicious as of now and looking for someone who is a current (I am a few years out of touch) to set me on the right path (confirm or deny my suspicions).




Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.