Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

I am just filling out and IT security review questionnaire  and not sure how to answer the following questions.
This is regards to an database over a secured internet connection using RSA.  I don't work in IT security and wondering if someone could explain me some basics  regarding  SSL and Two factor authentication.   I have read the RSA has a 128bit algorythm

Any network connection is encrypted through SSL or IPSec mechanisms when possible and symmetric encryption used is restricted to algorithms with a minimum key size of 128 bits..  

Thanks
0
Cyber Threats to Small Businesses (Part 2)
Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Hi All, i have attempted to ask Synology themselves but can't seem to get a decent answer. All they tell me is that Veeam is compatible with the Synology NAS

In the process of installing a Synology DS916+ NAS onto a network to be used as a Backup Repository for Veeam B&R

Now, Synology claims that the NAS has Encryption that would protect files from say Ransomware.

My questions are these:

1) If is use Veeam B&R to backup my VM's to the NAS, does the Veeam Backup create multiple copies of these backups so i can restore from a particular date and time? Multiple restore points?

2) Are these backup files encrypted and hopefully protected from Ransomware attacks?


Synology talks about the Hyper Backup facility that come with the device and this seems to have recovery points which i would assume are encrypted, but how does this work in terms of Veeam backing up to the NAS and would i have the same benefits of recovery points and backup encryption

Thanks everyone
0
I freeze my credit report from 3 beaurues. Equifax, Transunion, Experian. I did that because some people knows my social and date of birth and I don't want they knows my new address. My question is what other agencies i can use to freeze my credit history?
0
Windows 2008 R2
Tomcat 8.0.33

Trying to create SSL and install from a CA:
Step 1.
"%JAVA_HOME%\bin\keytool" -genkey -alias ecwinttomcat -keyalg RSA -keystore c:\ecwint.keystore
NO Password, hit enter.  
Step 2.
 
"%JAVA_HOME%\bin\keytool" -certreg -keyalg RSA -alias ecwinttomcat -file c:\ecwint.csr -keystore c:\ecwint.keystore

Get Error about -certreg illegal operation.
Cannot convert to a csr.
0
When a user tries to access an encrypted Excel file he gets the error message "Excel cannot access [filename]. The document may be read-only or encrypted."

This is happening on a Windows 10 64-bit OS.

When we try to remove the encryption attribute from the file we get an "Error applying attributes message. An error occurred applying attributes to the file. The specified file could not be decrypted."

What can be done to fix this issue so we can either open the file or so that we can remove the encryption from the file?

CANT-ACCESS-ENCRYPTED-FILEERROR-DECRYPTING-FILE
0
Hi.

I am not very familiar with this option. But I have a user that is trying to create a generic encrypted email and save it as a template so he can simply click on the encrypted email template and send to a recipient when he wants.

He's getting an error:
Microsoft outlook had problems encrypting message because recipient had missing or invalid certificates or conflicting or unsupported encryption capabilities


How would the recipient be able to open the email once it has been encrypted or is it in-encrypted based on the recipients email address???

Can you even have an encrypted email template???

Is some sort of certificate need to also be sent or shared???


Thank you
0
i am bit new to PKI certificates , is it  related to X 509 certifcate
0
Hi all,

I have been searching online for an answer for this question for a few days now with no luck and I am hopeful that someone here can answer it for me.

So, I have a Seagate Wireless Plus device that I encrypted using Bitlocker full disk/drive encryption. When I plug the drive into my desktop computer using a USB, I am required to enter the encryption key to access the drive. It works fine and I am happy with this.

However, I am wondering if the encryption extends to wireless access. In other words, if someone connects to the device while it is broadcasting its SSID (by default it does whenever it is powered up), would they be able to access the contents or would it be all a jumble to them?

Please note that I do not have any compatible wireless devices to test this on hence my reason for posting this question.

TIA
~Tala~
0
Hi,

I created a self-signed certificate on my Windows 10 PC.

I then went to a specific folder (which is part of my Google Drive folder on my PC), Right-click, Properties, Advanced (under General TAB) and enabled encryption for the folder. It immediately changed the icon of the folder, so I can see that it is encrypted.

I then shared this encrypted folder with another Google Drive user. This other user can open files in this folder without any issue.

This tells me that when one uploads the encrypted files from the PC to Google Drive it is decrypted on the fly.

How come would this happen and how can one stop the files from being decrypted?

In a nut shell: I don't want to use a 3rd party to encrypt the files before it goes to Google Drive, I want to use my own self-signed certificate on my PC, have files encrypted, but they need to stay encrypted when uploaded to Google Drive.

Thanks,
Reinhard
0
I'm using 11.2.0.4 for Windows 64bit. It comes with Java 5 as part of the install (I'm assuming so you don't need to have Java installed to use Oracle). How do I update that version of Java? I'm running into an error where I need the unlimited crypto package but I can't use it on Java 5 (I tried and it grenaded parts of Windows if I update the security files). I did then install Java 8 on the system but Oracle seems to look at it's own vs what is installed outside of Oracle.
0
Industry Leaders: We Want Your Opinion!
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Trying to find an official Microsoft product to hash an entire drive in MD5 or SHA256.

CertUtil only works for individual files.
Get-FileHash only works for individual files.

I need something for an entire drive or set of directories and files.
0
Hey all, im looking to encrypt some laptops for work. Does W10 Home offer Bitlocker?
0
All of the sudden accessing my gmail accounts through Outlook 2016 gets "Your server does not support the connection encryption type you have specified.  Nothing changed on my PC at all.

- I can log into Gmail on the web
- I checked my gmail settings and they are correct - I am using POP3
- it affects all of my gmail accounts
- I have repaired office
- no other office problems are corrected



Thanks
David
0
Hi,

I have MSSQL 2008 R2 Server that I need to reset the master key on one of the DB.  However, I cannot find the password for the current master key.  In my research to find a solution, I have found that I should be able to use;

ALTER MASTER KEY REGENERATE WITH ENCRYPTION BY PASSWORD = 'Not real password'

But I need to use the FORCE option.  Which I am not for sure how to use with the above query statement.

If this is correct, how do I use the FORCE option?

Thanks
0
In trying to get scan to email working I was changing settings in the kyocera cs400ci printer and now locked myself out of the GUI as the SSL settings I set it to are wrong and browsers dont trust it.

I checked SSL and DES only (no 3DES or AES) and now all browsers say invalid/bad/unsupported ssl/tls etc.

Any ideas on how I can ignore any/all ssl warnings and still get to the gui?  force ssl is on so I cant use port80.
0
Hi all,

Having being doing some extensive work around our public facing webservers we are now getting down to less known issues. Most of the work we have being doing was around Certificates and encrption. Following another recent scan we are still getting the saem result come up for most servers:

  • Strict-Transport-Security      
  • Content-Security-Policy      
  • Public-Key-Pins      
  • X-Frame-Options
  • X-XSS-Protection      
  • X-Content-Type-Options      
  • Referrer-Policy      

I have read a bit about them but its a bit over my head not having a web background. To mitigate these problems can someone tell me are these weaknesses linked to IIS or encryption. Knowing that would be a good start.
0
Hi There,

We have recently acquired a  new mail base and we need to sync the data over to our new server.
However we have encountered a problem where the passwords are encrypted.
There are 2 passwords, digest password: digestPassword = {SSHA}TWcg67eMGQn428d3dS4HbZJqytpFMkku182nLQ==
and encrypted password. I was given a key RSA-X.509 to decrypt it but unsure how to go about so.
Please could someone kindly advise as we have around 50k mailboxes to copy over.
Thanks
0
Hi,

I have some files/folders that were copied from a Mac and the files show up as being encrypted when extracted from a zip file.

I could not remove the encryption even after taking ownership.

Also, some windows computer can open the files and some cannot.

how can I fix this?

Thanks,
0
Experts,

I have a bucket called SRC.Jobs that I want to do a multipart encrypted upload to.   I have been told that I can't do this because the bucket has a period in the name.  Is there a way around this?  Changing the name will break a bunch of other processes.
0
Independent Software Vendors: We Want Your Opinion
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Hello,

Does anyone know a way I can print a secure PDF file? when opened the file says it is (SECURED).

I know this means the PDF is encrypted and I know that I need the password to unlock the encryption but I am not looking at unlocking or making the PDF editable but rather just have the ability to print what I can view on screen? I tried copying the content out but this doesn't work either.
0
We had an old windows xp PC in our 2008 domain which was reformatted to windows7 and joined back to domain.
Now we found one of the profile's mydocuments is encrypted.outlook pst file is also located inside the same folder.
we are not able to recover that showing access denied.tried changing permission but not working.
any recommendations please.
0
Which program is a good program for encrypting a portable external drive.
Are there any free programs?
Thanks Tony D
0
If I dont have a Windows server What program can I use to create a private and public key for use.
also whats best for secure email?
Thanks Tony D
0
What are my encryption options (hardware and software) for Thinkpad laptops specifically T540p and T560s models. We would prefer hardware encryption but open to ideas if there are better options. Thank you in advance for any input!
0
We have heard that it is possible that TrueCrypt can be accessed when the volume is mounted; it’s keys be retrieved.  

What considerations should one take in account for this possible breach of data?

... and does other OTFE apps suffer same conditions or flaw?

Please advice.
0

Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.