Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
3
votes
1 answer

How to decrypt files on a Windows domain, without user account password?

I have a Server 2008 file server, and and while here an employee encrypted several files, and has now since left to seek greener pastures. I want to decrypt the files, so others can access them. Can I simply change the account password, then login…
whatsisname
  • 291
  • 1
  • 3
  • 8
3
votes
2 answers

PGP decryption fails with error for one file

We store database backups encrypted with PGP Command Line 9.7.0. Files look like 2009.bak.pgp Here's command line used to backup these files: pgp --encrypt F:\2009.bak --recipient admin@company.mail --encrypt-to-self --input-cleanup off --temp-dir…
user135199
3
votes
1 answer

Access denied to EFS encrypted files after PC joins domain

I'm experiencing strange behavior with Windows Encrypted File System: I have a machine that is in workgroup mode (not joined to a domain) I encrypt an entire directory structure on the machine (basically a folder and subfolders with data files for…
Mike Marshall
  • 98
  • 2
  • 10
3
votes
3 answers

openssl blowfish key limited to 256 bits?

I get the following error if I give a key that is greater than 64 hex caracters (64*4=256 bits). According to this official document, blowfish is able to support key from 32 to 448 bits. Variable key length: 32 bits to 448 bits Is it possible to…
Jonas
  • 141
  • 5
3
votes
3 answers

Is there a way to make encrypted DNS resolutions?

Is there a way to make encrypted DNS resolutions, so that a packet sniffer in the same network still can't guess what DNS has been requested? Maybe, just thinking, by tunneling DNS requests through an HTTPS connection?
Mark
  • 452
  • 5
  • 13
3
votes
3 answers

TrueCrypt or EFS?

A subset of my users need a way to share an encrypted folder on the file server. Security is the most important, followed closely by ease of use. It appears that TrueCrypt is easier to set up. Does EFS have any advantages over TC to justify the…
Wayne Sheppard
  • 422
  • 6
  • 10
3
votes
1 answer

running arbitrary, encrypted shell commands via http(s)?

I'd like to be able to encode maintenance scripts to run on-demand remotely. edit: Good use-case: webhooks. e.g. trigger CI + staging deployment whenever someone pushes code to github. If I was to encrypt a shell command using a secure cipher like…
timoxley
  • 133
  • 1
  • 7
3
votes
1 answer

Cannot read device /dev/loop0

I'm trying to create a crypted drive on my loop0 device. For this command /sbin/cryptsetup create cryptedDrive /dev/loop0 I'm getting the following error Cannot read device /dev/loop0 Here's my strace output for the loop3 device: (for a better…
clinical
  • 133
  • 1
  • 6
3
votes
1 answer

Why is mkfs overwriting the LUKS encryption header on LVM on RAID partitions on Ubuntu 12.04?

I'm trying to setup a couple of LUKS-encrypted partitions to be mounted after boot-time on a new Ubuntu server which was installed with LVM on top of software RAID. After running cryptsetup luksFormat, the LUKS header is clearly visible on the…
Starchy
  • 118
  • 1
  • 6
3
votes
2 answers

Security of BitLocker with no PIN from WinPE?

Say you have a computer with the system drive encrypted by BitLocker and you're not using a PIN so the computer will boot up unattended. What happens if an attacker boots the system up into the Windows Preinstallation Environment? Will they have…
Scott Bussinger
  • 1,801
  • 4
  • 24
  • 27
3
votes
2 answers

Can root become user and access encrypted home?

The home is mounted unencrypted on login. I tried accessing it after doing 'su sampleuser', but it was encrypted, which is the expected behavior I guess. I also tried changing the user's password, and then logging in, but I was redirected to the…
HappyDeveloper
  • 654
  • 2
  • 6
  • 13
3
votes
1 answer

Are there any Microsoft Exchange Clients for iOS and Android that store their local data in an encrypted manner?

I don't feel like this is a product recommendation question, more of a "does this tech even exist and is it feasible" question, but if I'm wrong, feel free to give this question the boot. Context: Our company has a bunch of traveling employees who…
Zac B
  • 841
  • 1
  • 15
  • 27
3
votes
3 answers

Can EFS be set on a per group basis?

I've been asked to create some file store for our directors that will contain sensitive information. They have asked that it not be possible for other admins to read the data. I immediately thought of EFS, but I seem to recall this can only be done…
Bryan
  • 7,628
  • 15
  • 69
  • 94
3
votes
2 answers

How to enable encrypted connections to a SQL Server instance?

How can I enable an encrypted network connection to SQL Server? What have I to do on the client and on the server side?
splattne
  • 28,508
  • 20
  • 98
  • 148
3
votes
1 answer

verify integrity of encrypted tar

I'm using tar along with openssl to create encrypted tar archives of some large directories (about 30GB). What is the possibility of corruption in this process, and how would I verify that the encrypted tar archives are not corrupted? This is the…
pzod
  • 117
  • 2