Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Share tech news, updates, or what's on your mind.

Sign up to Post

I have developed a c# application that encrypts and decrypts files in a particular folder based on selected Bluetooth device range. If the selected Bluetooth device goes out of range, then the files in the particular folder gets encrypted and when the selected Bluetooth device comes back in range , then the files of the folder that were encrypted gets decrypted.
Here is the source code :
using System;
using System.Collections.Generic;
using System.Windows.Forms;
using InTheHand.Net.Sockets;
using System.Threading;
using System.Data.SqlClient;
using System.IO;
using System.Security.Cryptography;
using System.Text;

namespace Folder_Security
    public partial class EncryptDecryptTool : Form
        List<string> discoverable_devices_items = new List<string>();
        BluetoothDeviceInfo[] paired_devices;
        string key;
        public EncryptDecryptTool()

            cmb_UsersDisplay.Text = "Device List";
            key = generateKey();

        private const string _IV = "EncryptDecryptFile";
        private string generateKey()
            AesCryptoServiceProvider aesCrypto = (AesCryptoServiceProvider)AesCryptoServiceProvider.Create();
            return ASCIIEncoding.ASCII.GetString(aesCrypto.Key);

        private void start_devices_scan()
           Thread bluetoothScanThread = new …
Get your problem seen by more experts
LVL 12
Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

How would I get the private encryption key for a user's password in a windows 2008 AD domain?
I'm disabling USB ports for my team in order to tighten things up and help improve/prevent DLP, and meet some requirements that are being externally driven by our customers

Just curious what the preferred method is of instructing them how to work without flash drives going forward. IE emailing things to themselves

Or what happens if you're at a conference and there's an issue with accessing your email or the corporate network, and you need access to the particular file but cannot because the USB ports are now disabled and you couldn't bring a backup copy

Was doing some research online and couldn't find anything. Thoughts?
We are using gmail with our own Domain name.

How do we encrypt Outlook 2007, 2010, 2013, 2016 emails so the recipient has to enter a password to open email (w/ or w/o attachments)?

Also, can we do the same within Gmail emails itself via web browser?

I have developed an application that selects one file at a time for encryption and decryption purpose. Can someone suggest me how to run a loop so that I am able to select multiple files at a time for encryption and decryption purpose.
I have an existing installation of Dell Netextender on my home computer and need to know how to change the DNS setting.  

dns settings
Looking for a cost effective appliance based VPN solutions (Preferably clientless), for small business.

We have a number of small clients that we have been using the Netgear fVS-336s with a lot of success but they are no longer supporting it.
Some users remain on as much as 8-10 hours per day.


A customer has encrypted files on a network share via efs. Nobody, including the person that encrypted the files is able to open them anymore.
The files need to be decrypted and moved to another location but nothing seems to work.
I have found the certificate but still no luck. Any help would be appreciated.
Hello all,

just a question on Bitlocker for the experts. I've tried to find an answer online to no avail.

I know in Windows 10 pro (and previous o/s) you can have different login methods after encryption. You can encrypt the hardrive by right clicking C: and selecting the "Turn Bitlocker on" method, following the standard/ recommended process. However, i also know that in gpedit.msc you can configure the "Require additional authentication at startup" so that you can enter a PIN/Password on boot.

My question is.. What is the difference between them both? If i choose *not* to have an additional authentication at startup but have the hardrive encrypted, what are the security implications here?

I would really appreciate help/guidance if possible :)
Hello all,

When i reinstall my Windows 10, I delete the partition on my second hard drive by error.
That second hard drive was encrypted with BitLocker.
Is there a software to retrieve the data that was on that drive.
I have the decryption key.

Free Tool: ZipGrep
LVL 12
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

I want to encrypt dome documents I am storing in OneDrive. These are not ultra sensitive documents  but some are academic and I would like to keep them private What would you Advise?

My O.S. is Windows 10.  OneDrive sync client version

We have an external hard drive which was BitLocker encrypted by a Windows 10 PC.

This external hard drive is used to back up data on our PCs and servers.

Each month, we would back up  this data.

Each time the external hard drive is plugged into a PC, a password is required.

BitLocker does is not supported by our Windows Server 2003 servers so the password would not be unlocked.

Decryption is the first step we would do and then backup data from all PCs and servers.

This time, while the external hard drive was in the decrypting process and over 80% complete, the PC was accidently turned off.

After this happened, when trying to login with password to this drive to continue the decryption process, the password is not accepted.

I tried to unlock the drive by using the correct recovery key and it is also not accepted.

The last thing I tried was unlocking the drive through command line with administrative privilages with recovery key and the message back was; "The password failed to unlock volume E:".

I have researched this an some people have imaged the hard drive.

There is a lot of important data on this external hard drive and we would like to know how to unlock the drive and access the data rather than imaging the drive if possible as we would just have an external hard drive which is unusable.

All help appreciated.

We have a user that password-protect a lots of his documents.  He uses WinRar v3.61 (and latest WinRar) , WinZip v9 (and the latest) also uses the latest 7z,  In a meeting a colleague mention that the problem with these apps, though all uses AES-256 (except the old version of WinRar),  when unzipping the files, all the apps create an unprotected version of the contents on another area of the computer.  What is the exact location of these folders?
We would like to know if we can create keyfiles of an existing volume in order to use the keyfiles to open the volume if the user forgets the password.  Some time back an EE commented on keyfiles with similar topic bit haven't been able to find it.   Can this be done? (trying to safeguard access to the volume if the users forget)
I am in search of a simple PD encryption app, with the following features:
1. Can generate a private/public key pair.
2. Can encrypt and decrypt, using these keys.
3. It needs to be VERY simple, preferable with minimal bells and whistles.
4. Free, or cheap.
5. Runs on at least Windows 7 and above, 32 and 64 bit.

This is to be used to securely transfer files via email, dropbox, or USB keys. This has been prompted by some companies we deal with who insist on a high level of security, but are not all technically literate, hence it needs to be something that I can write up usage instructions for that an average computer user can interpret and action.

Any ideas?
Need a utility or script to password protect 300 excel files which are located in 300 separate folders on a network drive.
The reason being if someone accidentally emails any of these files they would be protected.

We do have email encryption already, but this would be for the case when a file is accidentally thought to be non-sensitive and emailed in the clear, but actually it is sensitive.
This way we have peace of mind that those files are protected.

Someone can sit and do all 300 using Excel, but I was thinking somebody out there had to make a utility by now for this... like Folder Guard (which didn't work).
The protection has to stay with the file and the files are stored on a Microsoft 2012 server.

How I can configure exchange 2007 to accept more recent cypher than RC4.
I have Exchange 2007 installed on windows server 2003
I am working on creating a DLP policy that does the following:

1) Provides a Policy Tip when Outlook detects that an email has a SSN in it.
2) Allows the user to send the message, but sends them an email advising them that they violated a policy
3) Allows an automatic override if the user supplies a subject-line based encryption trigger (encryption provided by our email security provider.  Sits in front of O365)
4) Allows an automatic override if the user requests encryption using an Outlook plugin (the plugin adds a header to the message and the email security provider detects that and encrypts the message.

The problem I am having is that Office 365 Security and Compliance DLP Policies are rudimentary and don't appear to allow requirements 3 and 4.  Exchange Online's DLP Policies allow everything but requirement 2.

Does anyone have any ideas around this?  Does the newer Security and Compliance polices allow refining with Powershell?  Thinking that maybe the GUI is rudimentary, and maybe I can get them to do what I want if I set them up with PS.

I've been beating my head against the wall on this.  It doesn't help that MS's replication schedule is an unknown.  I have no idea when the changes I make get applied.

Thanks in advance.
1. I have an msg file which is digitally signed and not encrypted, I could see 2 attachments from the email one is .P7M and the other one is .P7S. Can this happen ? I mean it should be either a .P7m file or a .P7s file right?
2. Can .P7s file support encryption and digital sign both?
3. Can you explain in detail the difference between .P7m and .p7S files?
Free Tool: Site Down Detector
LVL 12
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

What steps need to be followed to decrypt or remove Mac OS File Vault from a Mac operating system?
What steps do I need to take to determine if Mac OS File Vault is enabled?
Drive encryption is supposed to be a security feature so if someone steals the drive they can't read the data? I am missing something. I am going to pick on the Samsung 860 EVO. So I get one in and set it up. There is nothing stopping me from putting it in another computer and having it work. Same as if it were stolen.

   So how does this drive encryption work? Do you have to do something to enable/disable it?
I have 2 domain controllers\ file servers  installed at 2 different buildings. The domain controller's replicate data  through a circuit so that the changes on one server is replicated to the other server

This allows both to be identical for DR purposes etc

Users have shared areas on these servers and home directories
We use Comcast metro Ethernet between the 2 buildings

I had an auditor question me  about data encryption and I need someone to help me understand

The servers are Windows 2012r2

I was  told that the data on the servers needed  to be encrypted and the data also needs  to be encrypted when it replicates over the circuit to the other server
they explained it to me this way----- data that is moving or standing still must be encrypted

The data is inside my network secured by a firewall

The circuits are private- I was told by the auditors that the service provider could get access to the data as it moves through the circuit

Is the auditor right?

What could be done to fix this problem,?
What are the steps to remove Bit Locker encryption from a Windows 10 Professional OS?
How could a hacker exploit a cookie encrypted with 64 bit encryption?

I suppose the entire cookie is encrypted so a hacker could run that cookie through his decryption program until I starts finding patterns which match the English language. Is this how a hacker would crack it?

Or are there key terms the software would be looking for?

How long could this process take and wouldn't he need a pretty high powered machine for that?

Conversely, what is the highest number of bits as the best practices alternative? And how long would it take that same PC to crack it?




Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.