Encryption

6K

Solutions

31

Articles & Videos

8K

Contributors

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi,

We need to create a large trueCrypt volume, at least 1.5 TB.  Somewhere I read that the larger the size the less security TC volume has and of course, the bigger the volume the slower reading/writing to it.  As for the speed, it's no concern, but security yes.  That said, if what disadvantage is it creating a 1.5 TB (1,500 GB ) TC volume?  If EE doesn't recommend this big of a size, what is your recommendations?

Thank you in advance.
0
Industry Leaders: We Want Your Opinion!
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Hi all,

Im trying to implement a more secure means of using RDP. Having read up about I feel the TLS enabled option  would be sufficient. Having configured the host session properties on teh server to use SSL 1.0, encryption level high and ticked the box for allow connections from computers running NLA with auto generated Certificate. Haivng logged out and back in again I notice its still communicating over port 3389. Is this correct? Can I test whether this is encrypted?
0
Hi all,

I'm after your thoughts.  USB drives are a big risk to any network.  However, if a business enforces the encryption of USB Drives once they have been attached to a computer and are also scanned by an anti virus product, just how much risk do they now pose?

Any corporate data on there is now encrypted incase it is lost or stolen and any malware/virus should be detected before it is able to run (as long is it is not 0 day for example).

Should we still be concerned?  Many in the business want USB drives disabled by default, where as other think that the above controls mitigate the risks and will only force people to start printing (and losing) paper documents.
0
Hi,
    I got a error while installing Lync 2010 client install in Windows 7 32 bit machine.Please find the attachment file.

Error :- "cannot determine the encryption status of the temporary files folder"
Screenshot_1.png
0
Hi,

How can we change an existing password assigned to a file that is within WinZip compress & encrypt file.

The no-brainer is just extract and compress with new file, but we  are looking for changing without the need extracting.
0
Is it possible if any one knows my social security number and date of birth can pull my credit history?
0
After several hours of research and trial and error, I have found that I am unable to enable bitlocker on removable USB drives without password.

I am mostly curious and confused, as the policy description and all the documentation I have found indicates that having a password is optional -unless you make it mandatory. Everything in the language makes it appear that one should be able to enable bitlocker-to-go and not set a password.


"Configure use of passwords for removable data drives:

This policy setting is used to require, allow, or deny the use of passwords with removable data drives.

If you enable this policy setting, users can configure a password that meets the requirements that you define. To require the use of a password, select "Require password for removable data drive". To enforce complexity requirements on the password, select "Require complexity".

If you do not configure this policy setting, passwords will be supported with the default settings, which do not include password complexity requirements and require only 8 characters"


Initially I left the relevant settings "Not Configured."  I've since tried pretty much every iteration of the settings, as well as enabling BitLocker from right-click, control panel, and manage-bde.  I receive the enable bitlocker dialog window, and cannot proceed until I have supplied a password and password confirmation.  ("Next" is grayed out.)



Am I misunderstanding the policy options? Has anyone dealt …
0
Hi Experts,

Im trying to convert a series of scripts that we use internally to a vb.net applicaiton with a GUI that can be passed on to the BAU teams. Unfortunately my knowledg around encryption is pretty non existant.

Would anyone be so kind as to explain to me how to convert the below perl to VB.NET? Or at least point me in the correct direction as far as namespaces etc are concerned?

use DBI;
use strict;
use warnings;
use Crypt::CBC;
use MIME::Base64;
use Encode;
use Digest::MD5 qw(md5_hex);
use warnings;


my $encrypted = <FILE>;

my $iv  = '0000000000000000';
my $utf_decoded = encode_utf8($iv);
my $key = "854EE3617FDDA2D3";


#create Cipher based on AES
my $cipher = Crypt::CBC->new(
				-key => $key,
				-literal_key => 1,
				-iv => pack('H32',$utf_decoded),
				-header => 'none',
				-padding => 'standard',
				-blocksize => 16,
				-keysize => 16,
               -cipher => "OpenSSL::AES"
);

my @dec = decode_base64($encrypted);
my $count = 0;

foreach my $entry (@dec) {
	my $temp = $cipher->decrypt($entry);
	$temp =~ s/[\x0D]//g; 
	$count++;
	print "$temp";
}

exit();

Open in new window



Here is what i have so far.... not going so great.

Public Function AES_Decrypt(ByVal input As String)

Dim KeyStr As String = "854EE3617FDDA2D3"
        Dim IVstr As String = "0000000000000000"
        

        Dim IV(15) As Byte
        For I = 0 To 15
            IV(I) = IVstr.Substring(I, 1)
        Next

        Dim AES As New RijndaelManaged
        Dim Hash_AES 

Open in new window

0
I have a application that needs to lots of Compression / Decompression. I have checked out many good tools but
they all have major drawbacks.

I use Delphi for Development.

Zipmaster (Standard Encryption Only)
ZipForge (Cannot handle long file names > MaxPath)
Xceed (Too expensive)
7Zip (Slow)

Please advice
0
One PCI DSS assessor had suggested that our Data Domain (sort of VTL as we have
replaced tapes with disks which we backup to remotely to our DR site) ought to be
encrypted.

Internally storage team argued that shouldn't we
a) encrypt at source & only selective sensitive data ?   Then we have much less
    to encrypt
b) encrypting entire data domain will entails more load (tho I've seen EMC's
     solution for this)
c) our assessor's justification is there may be sensitive data (eg: PAN or
    credit card#) in the logs that get backup from our Prod to DR site thus
    the need to encrypt it at destination
d) I know encrypting tapes is highly recommended as tapes are transported
    offsite (for storage) during transit, tapes may get lost.  But if we are using
    point-to-point link between our Prod & DR sites, there's no risk of losing
    media in transit.  Is this argument valid?
e) Also, should a HDD in a SAN get faulty & is being returned to vendor, what
    are the chances anyone or even a determined hacker could read the faulty
    (or even if it's not faulty) HDD for sensitive data?  Data is spliced randomly
    in SAN's HDD, virtually making data in the HDD undecipherable?  
f) when data is being backup from our Prod datacentre to DR site using
    point-to-point leased line (assuming the line do not have encryption),
    what's the risk it could be tapped or subject to MITMA?  Any security
    guideline that says backup traffic that is not …
0
On Demand Webinar - Networking for the Cloud Era
LVL 9
On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

need your expert opinion.

Client as wifi access point with WPA2 enabled also AES encryption with 40 character length password, in light of attacks and worms and wannacry, client wants to authenticate users on wifi using Radius ----what you think about this setup?

P.s Radius with iKev2
0
Hello,

Do you know if Exchange 2016 will accept & send TLS encrypted mail by default?

A client is going to be encrypting their mails with TLS and want to know whether Exchange 2016 will allow these through & send.

Thanks
0
Hi,

1. I have some sensitive data on my laptop - sometimes - not always.  Typically, this is excel/access type data.
2. I am basically lacking in sufficient discipline to encrypt individual files each time I access. The solutions must be easy and happen in the background.
3. I do not want a significant slowing down of my PC

QUESTION: What is the best way to protect the data on my PC?  (I am happy to pay for hardware if necessary).
0
Is it possible to send encrypted email to a different Exchange organization? An example would be send encrypted email from jdoe@email.com to jmoe@test.com

Our users are getting the below message when attempting to send encrypted email to a different exchange organization:
Microsoft Outlook had problems encrypting this message because the following recipients had missing or invalid certificates, or conflicting or unsupported encryption capabilities.
0
Hi

To perform the connection test Keytab file need to be created with KTPASS command, but the KTPASS supports only DES-CBC-CRC, DES-CBC-MD5, RC4-HMAC-NT, AES128-SHA1, AES256-SHA1 encryption types.

https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/ktpass

It is required to Test the Kerberos connection with RC4-HMAC-EXP encryption type.

Please suggest how to Test the Kerberos connection with encryption type RC4-HMAC-EXP.

Thank You
0
hi! i wanna ask. where can i get crypto ransomware sample for my final year project? and how to used it? my project about to analyze the ransomware attack using digital forensic tools. can you help me?
1
can you provide examples for encryption/decryption with e AES 128,AES 256,DES and 3DES algorithm  with Encoding: UTF-8, ECB mode
in JAVA using BouncyCastle api.
0
I have used Public Key / Private Key encryption tossed attachment to emails, but can it also encrypt the emil traffic between two people?

I have Thunderbird for Mac on my end.

Thanks.
0
Hello Experts,

One of our users has an essentially new Surface Studio system that was given to him by another user.  When the second user received the system he attempted to remove the first users' profile and then reset the system to factory default.  I don't have much detail on exactly what was done, as I only learned that this system is having problems yesterday afternoon, and could not be logged into.  

When I first saw the system it was locked with bitlocker and prompting for the recovery key when it booted up.  I was able to retrieve the key, and attempted to boot into the system.  When I did that, I was almost immediately presented with a "critical process died" error,  and soon after the system would then restart itself.  I went through this a few times last night, and also tried skipping the drive and  navigated to the reset options in an attempt to reset the system back to factory install status, but then received a message saying the drive needed to be unlocked first.

I left the system at that point last night, and went to have another go at it this morning.  When I arrived at the system this morning, it is now in a loop where as soon as I power it on it goes straight to the "critical process died" error without asking for the encryption key, and essentially loops in this state.

Resetting the system back to factory install status is preferable, but at this point I don't know of any options.  I do not believe the original user has any recovery media …
0
Threat Trends for MSPs to Watch
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Hi Guys

I got an email from my bank with securedoc.html . I was expecting this email but when i was trying to open it I go an error  

Untitled.png

What should I do? I have  Java installed
0
How long approx to encrypt - depends on amt of data?

How long to search and infect other computers?

Once the horse bolts is it seconds or minutes? is there any time to power off the first computer or is it always too late to contain?  

Data recovery for data not encrypted >  If a computer is powered off mid attack can the drive be slaved without infecting the worker or cleaner computer to get data back?

Thanks
0
Hi Experts,

I'm in middle of a process of securing data in our database.

Would like to move all employees sensitive data into a separate table and have the columns there set as encrypted columns.

Now I am basically looking for an introduction on how to successfully use that within my Access FE application.

Was trying to follow what it says on following link
https://blogs.msdn.microsoft.com/lcris/2005/06/09/simple-demo-for-how-to-encrypt-and-decrypt-a-table-column-in-sql-server-2005/
However when I ran the following view, the encrypted column was showing as null..
create view v_employees as select id, name, convert(varchar(10), decryptbykey(salary, 1, convert(varchar(30), id))) as salary from t_employees;

Open in new window


Thanks in advance.
0
Hi guys I'm the market for harddrive open source encryption I use to use truecrypt but that was busted some time ago-- my company encryption is not yet compatible with windows 10 in the mean time I need a an opensource encryption to use while company works out the kinks with current encryption
0
Hi,

I have a web,config which contains passwords. I want to encrypt the sections with these passwords. For the appsettings section I use the next command:
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe -pef "appSettings" "D:\Encrypt\Config"

This works fine. However if I use the same command for the system.serviceModel section:
%WINDIR%\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe -pef "system.serviceModel " "D:\Encrypt\Config"

I get the next error: 'The configuration section system.serviceModel was not found.'

This section however exists. Anyone an idea how to solve this?

Regards,

Arne
0
Right now we are using BitLocker with Active Directory integration. Means all recovery keys stored in Active Directory using group policy.
Our most of the users tired because of two inputs while login, means 1st is BitLocker PIN and 2nd is Windows Domain Login.

Now we want to deploy BitLocker with Single Sign On (SSO).

Although SSO Encryption bundled with most of the Enterprise Antiviruses, but definitely we need to purchase licenses.

I need step by step configuration of “BitLocker with Single Sign On (SSO)” with AD integration.

Is this free from Microsoft?

What about MBAM?

Early reply will be highly appreciable.
0

Encryption

6K

Solutions

31

Articles & Videos

8K

Contributors

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.