Tags: encryption

GPG Sync Simplifies Encryption Key Management

Open source project GPG Sync makes it easier for organizations already using GPG to encrypt email messages to manage different user keys. In all the discussion about using encryption, a critical point keeps getting lost: It's difficult to work with, and it's even harder to deploy it at scale....
Read 0 Comments

lets-encrypt.png

Let's Encrypt
“We want every server on the Internet to have a certificate,” said Josh Aas, speaking about the Let’s Encrypt project at LinuxCon North America.

Let's Encrypt: Every Server on the Internet Should Have a Certificate

The web is not secure. As of August 2016, only 45.5 percent of Firefox page loads are HTTPS, according to Josh Aas, co-founder and executive director of Internet Security Research Group. This number should be 100 percent, he said in his talk called “Let’s Encrypt: A Free, Automated, and Open...
Read 0 Comments

Let's Encrypt: Why Create a Free, Automated, and Open CA?

During the summer of 2012, Eric Rescorla and I decided to start a Certificate Authority (CA). A CA acts as a third-party to issue digital certificates, which certify public keys for certificate holders. The free, automated, and open CA we envisioned, which came to be called Let's Encrypt, has been...
Read 0 Comments

security-gpg.png

Gnu Privacy Guard
This intro to Gnu Privacy Guard will help you secure your environment and be able to send and receive encrypted data.

How to Send and Receive Encrypted Data with GnuPG

The day has come where the security of your data—be it on a server, a work desktop, or your personal machine—is one of the single most important issues you can take on. Whether you’re hoping to secure company information or private email to clients, friends, and/or loved ones, you need to...
Read 1 Comments

How to Encrypt and Decrypt Files and Directories Using Tar and OpenSSL

When you have important sensitive data, then its crucial to have an extra layer of security to your files and directories, specially when you need to transmit the data with others over a network. That’s the reason, I am looking for a utility to encrypt and decrypt certain files and directories in...
Read 0 Comments

encryption-protection.jpg

encrypted backup
In this article on encrypted backups, you'll learn how to fine-tune your file selection and how to backup your encryption keys.

Managing Encrypted Backups in Linux, Part 2

In part 1, we learned how to make simple automated unencrypted and encrypted backups. In this article, I will show you how to fine-tune your file selection, and how to backup your encryption keys. rsync Include and Exclude Files rsync supports all kinds of complex ways to build lists of files that...
Read 0 Comments

data-keys-encryption.png

data keys
This article shows how to use rsync and duplicity for strong protection against data loss.

Managing Encrypted Backups in Linux: Part 1

Encrypted backups are great, but what if something goes wrong and you can't read your encrypted files? In this two-part series, I’ll show how to use rsync and duplicity as your belt-and-suspenders protection against data loss. Part 1 shows how to create and automate simple backups. In part 2, I'll...
Read 4 Comments

encrypt-flash-drive.png

encrypt flash drive
Learn how to encrypt your flash drives with two simple tools and these easy steps from Jack Wallen.

Easily Encrypt your Flash Drives with Linux

If you travel with sensitive data, you know there are always risks that your information could be lost or stolen. Depending on the nature of your data, that could be a disaster. To that end, you might want to consider encrypting those flash drives. Once encrypted, a passphrase will be required to...
Read 7 Comments

encrypt_main.png

Encryption
Learn how to add encryption to your email for increased security.

How to Enable PGP Encryption in Evolution

Whether you’re using the Evolution groupware client for work or personal email, you very well might need to add a layer of security to your communications. You might be transmitting company secrets or sensitive personal data—either way, having that extra insurance that your missive will arrive...
Read 2 Comments

Prep for Next-Gen Encryption Should Start Yesterday

The National Institute of Standards and Technology is getting nervous about quantum computers and what they might mean for the cryptographic systems that protect both public and private data. Once seen as far off -- if not borderline science fiction -- quantum computing now seems a much closer...
Read 0 Comments

Pages

Click Here!