Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

On this other crypto currency, I sew the term ICO:

https://www.exiocoin.com/pre-ico-terms

What is that?
0
When ransomware hits your clients, what do you do?
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Hello!

I am trying to encrypt a file using pgp in a batch file. It works fine as long as I give a C drive path. Once I change it to a network path, I get the following error.

gpg2.exe --batch -o "\\<network server>\<network folder>\<network folder>\XYZ.txt.gpg"
-r <certificate here> --trust-model always -e "\\<network server>\<network folder>\<network folder>\XYZ.txt"
gpg: can't open `\\\\<network server>\\<network folder>\\<network folder>\\XYZ.txt': No such file or directory
gpg: \\\\<network server>\\<network folder>\\<network folder>\\XYZ.txt: encryption failed: No such file or directory

Code:
***********************************************
set final="\\<network path>\XYZ.txt.gpg"
set original="\\<network path>\XYZ.txt"

gpg2.exe --batch -o %final% -r <certificate here> --trust-model always -e %original%
***********************************************

I have tried net use & pushd, both aren't working.

Appreciate any help.
0
After I've configured the device I can't get out to internet via any of the pcs.  I can access the 5505 from and outside computer and can configure it via the ASDM so I'm not sure what the problem is.  Can someone verify my config below?

ASA Version 8.3(1)
!
hostname ciscoasa
enable password OlOxQ1nyrZ49h6MK encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.2.1 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
object network obj_any
 subnet 0.0.0.0 0.0.0.0
object network NETWORK_OBJ_192.168.2.0_24
 subnet 192.168.2.0 255.255.255.0
object network SCETI
 subnet 172.172.128.0 255.255.255.0
access-list outside_1_cryptomap extended permit ip 192.168.2.0 255.255.255.0 object SCETI
access-list inside_access_in extended permit ip any any
access-list outside_access_in extended permit ip any any
access-list outside_access_in extended permit tcp any host 192.168.2.100 eq 3389
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source …
0
How to remove administrative password for bios setting.?
0
Referring to above Struts vulnerability, would an encrypted DB have helped
prevent this data leak/loss?  

Does this Equifax & AXA dl come about by issuing an sql command?

There could be other unknown vulnerabilities yet to be discovered so
wud DB encryption had helped?
0
I'm looking for library/Nuget package that i can use for encrypting and decrypting passwords and store it in database.

I have looked at popular libraries which are mostly "one way hashing" , but I need one that I can decrypt the password as well.
0
Having an issue backing up or copying files from a server. We receive access denied errors on the files. I have checked the permissions and administrator user has full control. I also noticed that of the files that I have checked, they seem to have the E attribute set (encrypted?).
Any help would be appreciated.
0
I know we encrypt from the Client to the Server but I have been asked to see if the Email Data is encrypted at rest?
0
I heard it's possible to encrypt using private key, and decrypt using public key, at least for RSA.

This is backwards to what I know about public/private encryption, where public key is to encrypt message, which only private key can decrypt. Everyone can send you a message which only you can read.

But it would be very useful to be able to do the opposite, where only I can send encrypted messages which everyone can decrypt using a public key. No one can forge a bogus message.

Can someone explain why it's possible to encrypt with private key and decrypt with public key? Since that's the opposite if how I thought it worked?
0
I’m trying to figure out when to use bitlocker on a server. It makes sense for a laptop or desktop. If they are stolen and the thief can’t login because it is password protected, they could still put the drive in another computer and access the data.

If I have a server in a locked room and there is no concern that it would be stolen, what are the benefits of encryption?

Even if someone did steal the server, it is RAID 5 so it would be a lot more difficult to add the drives to another server to access the data.  It would be easier to run a program to hack the password.

If it is configured to use a pin to start the server, it could not be rebooted remotely. If it shut down for any reason, someone would need to go onsite to start it up. That could create problems especially during storms.

The most likely way someone is going to steal the data from my clients is by tricking a user to install malware. If malware is installed on a workstation, it would be able to access the server whether it is encrypted or not.

Just looking for the pros and cons if encrypting a server
0
New feature and membership benefit!
LVL 10
New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

We are using PBEWithMD5AndDES encryption to encrypt ids for the purposes like, password reset links and some other places in the application for many projects.

Now we would like to change the encryption algorithm for the new projects.
What will be the secure and fast encryption algorithm for these purposes.

Is AES amd symmetric key encryption secure?
0
In this article, I read "Even in the optimistic scenario, just mining one bitcoin in 2020 would require a shocking 5,500 kWh, or about half the annual electricity consumption of an American household."

https://motherboard.vice.com/en_us/article/aek3za/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020

So, I am trying to understand what exactly is meant by "mining one bitcoin."

Does this mean looking through the entire ledger to trace the history of a single bitcoin?

How large is that ledger, in record count...

Does the BlockChain database format have any query capabilities?

Please tell me what you can, since I find this entire problem very daunting.

Thanks
0
Hello Experts.

At my work we recently began receiving emailed e-pay slips as password protected PDF files.  I print them out to a paper hardcopy at work then email them to my personal email account and later save out the PDF attachments to my own PC at home.  Each time I open them I have to type in the 6 character password I was supplied by my employer.

The first page is the same for all of them and is simply company details, etc.  I would like to remove the first page from all of them as I copy them to my PC and optionally at the end of a financial year merge them into one PDF.  My preferred PDF Printer is the open source  PDFCreator:
http://www.pdfforge.org
http://sourceforge.net/projects/pdfcreator
which installs a module named "PDF Architect", but it cannot remove or add pages and it does not prompt me for the password that might overcome its inability to do so.  It goes through the motions, but results in blank pages.

If I open one of the PDF files in Adobe Acrobat Reader and "print" it to PDF using the PDFCreator virtual printer, all I get is a blank document containing:
ERROR: undefined
OFFENDING COMMAND: eexec
STACK:
/quit
-dictionary-
-mark

I don't ever want to install Google Chrome on any of my PCs again and my work does not allow Chrome either, otherwise I have a feeling that I could open the PDFs in Chrome and save out as new PDFs minus the restrictions.  I do not have access to the full Adobe Acrobat either.  I recently uninstalled an old …
0
I got a requirement to encrypt a portion of URL.

For example, I have:

http://mydomain.com/test/para1

How can I encrypt "para1" so that it's readable and valid as part of a complete URL?

After the encryption, it can become something like this:

http://mydomain.com/test/HTtgj3d090e879da792179ed87wbl

But afterall, it's still a valid URL. (avoid encrypted key contains chars like / ? , etc)

Please advise how to do that. Thank you.
0
I am just filling out and IT security review questionnaire  and not sure how to answer the following questions.
This is regards to an database over a secured internet connection using RSA.  I don't work in IT security and wondering if someone could explain me some basics  regarding  SSL and Two factor authentication.   I have read the RSA has a 128bit algorythm

Any network connection is encrypted through SSL or IPSec mechanisms when possible and symmetric encryption used is restricted to algorithms with a minimum key size of 128 bits..  

Thanks
0
Hi All, i have attempted to ask Synology themselves but can't seem to get a decent answer. All they tell me is that Veeam is compatible with the Synology NAS

In the process of installing a Synology DS916+ NAS onto a network to be used as a Backup Repository for Veeam B&R

Now, Synology claims that the NAS has Encryption that would protect files from say Ransomware.

My questions are these:

1) If is use Veeam B&R to backup my VM's to the NAS, does the Veeam Backup create multiple copies of these backups so i can restore from a particular date and time? Multiple restore points?

2) Are these backup files encrypted and hopefully protected from Ransomware attacks?


Synology talks about the Hyper Backup facility that come with the device and this seems to have recovery points which i would assume are encrypted, but how does this work in terms of Veeam backing up to the NAS and would i have the same benefits of recovery points and backup encryption

Thanks everyone
0
is there any Tool available to Decrypt  n1n1n1 Ransomware?
0
Is there a software you can recommend to perform this?


Thanks.
0
I freeze my credit report from 3 beaurues. Equifax, Transunion, Experian. I did that because some people knows my social and date of birth and I don't want they knows my new address. My question is what other agencies i can use to freeze my credit history?
0
Free Tool: Port Scanner
LVL 10
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Hey guys.

So I understand the security setting in the policy and that generally the advice is "Turn off FIPS encryption". I know that the symptom is that you send a MSRA request to a client on your domain and the remote assist launches on the reciepent client PC but they never get asked to accept the session and it seems the request dies during the handshake.

At the moment one work around I am using is remoting into another machine w/o FIPS enabled in the GPO; but this is a work around and will not last. Sadly my searches never yielded a good guide to what to configure to use FIPS encryption. Thats what I am looking for.

I have complete admin control over the sender and reciepient. I can also talk to my AD guys if there are trweaks that we might need to do at the network level; but I assuming we can probably avoid needing their involvment. We are running Windows 10 Workstations with a few 7 Enterprise machines sprinkled in.

Advice/help?
0
Windows 2008 R2
Tomcat 8.0.33

Trying to create SSL and install from a CA:
Step 1.
"%JAVA_HOME%\bin\keytool" -genkey -alias ecwinttomcat -keyalg RSA -keystore c:\ecwint.keystore
NO Password, hit enter.  
Step 2.
 
"%JAVA_HOME%\bin\keytool" -certreg -keyalg RSA -alias ecwinttomcat -file c:\ecwint.csr -keystore c:\ecwint.keystore

Get Error about -certreg illegal operation.
Cannot convert to a csr.
0
i got key for encryption and KCV value to validate key.
how can i do it with java OR online.
0
When a user tries to access an encrypted Excel file he gets the error message "Excel cannot access [filename]. The document may be read-only or encrypted."

This is happening on a Windows 10 64-bit OS.

When we try to remove the encryption attribute from the file we get an "Error applying attributes message. An error occurred applying attributes to the file. The specified file could not be decrypted."

What can be done to fix this issue so we can either open the file or so that we can remove the encryption from the file?

CANT-ACCESS-ENCRYPTED-FILEERROR-DECRYPTING-FILE
0
Hi
I am looking for information on step by step
needed to use outlook email encryption.

Would also like to have it as a template so it could be sent regularly to the receiver.
0
Hello all,
my DPM tape backup is encrypted with a certificate.
I do not have a certificate, and can't remember issuing one.
the old certificate had expired, and a new one had been generated in APRIL.
we can't use the expired one, we need the APRIL one that i don't have and i can't recall creating it.

is it possible that it was auto renewed by the DPM server automatically ? or this certificate must've been generated and imported into the DPM certificate store manually by someone else ?

PS: we can't export the certificate, as we lost the DPM used to do the backups.

Thank you
0

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.