Tags: encryption

Quantum Computing and Cryptography

Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to...
Read 0 Comments

Encrypting NFSv4 with Stunnel TLS

NFS clients and servers push file traffic over clear-text connections in the default configuration, which is incompatible with sensitive data. TLS can wrap this traffic, finally bringing protocol security. Before you use your cloud provider's NFS tools, review all of your NFS usage and secure it...
Read 0 Comments

How to Use the gpg Command to Encrypt Linux Files

There are many reasons to encrypt files — even on a system that is well maintained and comparatively secure. The files may highly sensitive, contain personal information that you don't want to share with anyone, or be backed up to some variety of online storage where you'd prefer it be extra secure...
Read 0 Comments

New IEEE Position Statement Supports Strong Encryption

On 24 June, the IEEE Board of Directors adopted a position statement in support of strong encryption for confidentiality and data integrity.  The essence of the position is that: “IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and...
Read 0 Comments

Using the Command Line to Decrypt a Message on Linux

If you have disabled the PGP plugin from your mail client and saved a copy of an encrypted email to your desktop, this guide will help you read that message in as safe a way as possible given what we know about the vulnerability described by EFAIL. Note that the first three steps (opening the...
Read 1 Comments

lock-1920.jpg

lets encrypt
Unencrypted HTTP sessions are wide open to abuse; lock them down with Let's Encrypt.

Protect Your Websites with Let's Encrypt

Back in the bad old days, setting up basic HTTPS with a certificate authority cost as much as several hundred dollars per year, and the process was difficult and error-prone to set up. Now we have Let's Encrypt for free, and the whole thing takes just a few minutes. Why Encrypt? Why encrypt your...
Read 1 Comments

TLS 1.3 Is Approved: Here's How It Could Make the Entire Internet Safer

​The IETF has finally given the okay to the TLS 1.3 protocol, which will speed up secure connections and make snooping harder for attackers. TLS 1.3 has been approved for use, which will make all secure internet connections faster and safer. The security and speed improvements brought by TLS 1.3...
Read 0 Comments

encryption.jpg

encryption
Jack Wallen walks you through the process of encrypting and decrypting a file from within three popular Linux file managers.

How to Encrypt Files From Within a File Manager

The Linux desktop and server enjoys a remarkable level of security. That doesn’t mean, however, you should simply rest easy. You should always consider that your data is always a quick hack away from being compromised. That being said, you might want to employ various tools for encryption, such as...
Read 0 Comments

Six Cyber Threats to Really Worry About in 2018

Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for this year. More huge data breaches The cyberattack on the Equifax credit reporting agency in 2017, which led to the theft of Social...
Read 0 Comments

Transport-Layer Encryption vs End-to-End Encryption

It’s also important for learners to be able to distinguish what the encryption they are using to protect their information does and does not protect against. One way to clarify this conversation is to point out two different types of encryption for their information in transit: transport-layer...
Read 0 Comments

Pages

Click Here!