Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
4
votes
1 answer

Pure FTPd and MySQL, working with sha512

I'm currently developing an application for shared hosting, using a complete MySQL backend for the machine. I've set up all my services, and they're quite operational, however I've a little problem with pure-ftpd. As you may know, Pure-FTPd can work…
John WH Smith
  • 341
  • 5
  • 19
4
votes
3 answers

How do I limit SSL/TLS connections to at least 128-bit encryption?

When I'm ordering an SSL cert for my public web server, how can I be sure that the web server (IIS 6 in my case) will only allow SSL/TLS client connections supporting our corporate standard of at least 128-bits symmetric encryption. I'm aware you…
spoulson
  • 2,183
  • 5
  • 22
  • 30
4
votes
4 answers

Mount EncFS at boot

am trying to get an EncFS encrypted home to mount at boot without user input (directly, not via ssh). Have tried various solutions (adding a volume entry in pam_mount.conf.xml, various tweaks to various pam files) with no joy. Can mount the encfs…
senrabdet
  • 41
  • 1
  • 2
4
votes
1 answer

Active Directory reversible encryption for single sign-on?

Problem: Creating and maintaining hundreds of student accounts The school where I work runs Active Directory on Server 2008. Every year, our students have to sign up for accounts with a third-party SaaS school management system. That has created a…
4
votes
2 answers

How to add authentication to ssh dynamic port forwarding?

I am using ssh client as a SOCKS server by running on the remote server this command: ssh -f2qTnND *:1080 some-server-user@localhost There is only one problem here: anyone can connect to the server and use it's internet connection. Options: To use…
Aalex Gabi
  • 147
  • 1
  • 7
4
votes
2 answers

Encrypt content of disk without entering password at boot time

I am running Linux virtual machines on a cloud provider. So effectively, the disk is a VHD file. The machine will have some sensitive information on the disk, such as certificates, passwords... I would like to encrypt some part (or all) of the disk…
Flavien
  • 367
  • 1
  • 2
  • 8
4
votes
2 answers

Encrypt communication between mail servers

I'm using my own root server for my email accounts. All the traffic between my pc and my server is encrypted. Is there a possibility to force my email-server to communicate with other email-servers also encrypted?
soupdiver
  • 807
  • 2
  • 9
  • 26
4
votes
2 answers

Do I need to back up the SQL Server Encryption Password and Symmetric Key?

I'm trying to setup SQL Server to use Cell-Level Encryption on some sensitive data. It seems straightforward per this example on the MSDN: Create the Master Key with a strong password. Create a Certificate. Create a Symmetric Key with the…
John B
  • 171
  • 1
  • 11
4
votes
2 answers

Variable size encrypted container

Is there an application similar to TrueCrypt, but the one that can make variable size containers opposed to fixed-size or only-growing-to-certain-amount containers which can be made by TrueCrypt? I want this container to be able to be mounted to a…
Cray
  • 210
  • 3
  • 9
4
votes
1 answer

What are the Jenkins/Hudson key files for?

After I have installed Jenkins (on Windows), the program folder contains, among others, two files: identity.key (28 lines) -----BEGIN RSA PRIVATE KEY----- MIIEow...... ... -----END RSA PRIVATE KEY----- secret.key (64 characters) d6....38 (I've…
Martin
  • 589
  • 4
  • 10
  • 27
4
votes
1 answer

SQL Server encryption - rotate keys for PCI compliance

PCI compliance requires annual rotation of keys. The definition of "rotation of keys" that I keep coming across is decrypting your data, then re-encrypting with a new key. Really? Everyone out there is decrypting / encrypting all their encrypted…
Hank
  • 41
  • 1
  • 2
4
votes
4 answers

Disk encryption in Debian

I have a Debian Lenny server running a production application. Recently, we are being asked by a consultant to enable disk encryption for data security. He believes full disk encryption will require us to wipe disks clean and start the server setup…
Mohammad Emran
  • 195
  • 1
  • 2
  • 8
4
votes
5 answers

Is there any point in running SSL and encryption for email?

Sorry if this is a stupid question, I'm curious what the difference between the two is if any. Is there any point in running SSL and encryption for email? Or, is one method of security good enough?
gnucom
  • 197
  • 8
4
votes
3 answers

Get cryptsetup working without typing a password

I have used cryptsetup to encrypt an external hard drive. I have no problem at using the encrypted hard drive in this way: /sbin/cryptsetup luksOpen /dev/sdc1 backup // typing password // mounting the partition // doing something //…
Daniele
  • 661
  • 1
  • 7
  • 10
4
votes
2 answers

Encrypt remote linux server

One of my customers has requested that their web server is encrypted to prevent offline attacks to highly sensitive data contained in a mysql database and also /var/log. I have full root access to the dedicated server at a popular host. I am…
Michelle
  • 923
  • 5
  • 20
  • 30