Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
1
vote
1 answer

Writing encrypted syslogs

I have a request to find out if there is a way to store syslog messages encrypted. I don't have a problem with making logrotate (or a bash script) encrypt messages nightly, but is there a way that I can stream encrypted syslog messages? I thought…
Peter Turner
  • 2,178
  • 9
  • 33
  • 45
1
vote
3 answers

I Want an Affordable Snapshot-Saving Crypto-Backupping RAID NAS

This is what I am looking for: A NAS storage/backup solution (hardware/software combo) which has RAID for redundancy full-disk encryption for security snapshot capabilities (multiple/regular snapshots) It must be affordable (<1000 USD), and not…
grojo
  • 429
  • 1
  • 7
  • 18
1
vote
0 answers

making HTTPS work on LAN with self signed certificate

This is on a local area network (LAN). There is no internet connection. One admin has admin access to both the linux server and windows10 pc's. I have a linux server running third party software to establish an over-the-network OpenGL remote…
ron
  • 805
  • 3
  • 11
  • 21
1
vote
0 answers

Remote Office 365 worker - laptop lockdown

We have a small Office 365 tenant of about 20 users, mix of E3 and Business Essentials. We are now migrated from a local LAN file server to SharePoint Online and OneDrive so would like to move the few remote workers from a Dial-in VPN/RDP setup to…
Sandwich
  • 11
  • 1
1
vote
0 answers

Encrypting communication between between Microservice in my company and AWS

I am dealing with communication between microservices. Microservice A - Angular6/django Microservice B - NodeJS My Microservice A is in company network and Microservice B is in AWS. we need to find a way to communicate between them securely like…
1
vote
1 answer

How to protect data on Windows Server

I'm renting an unmanaged dedicated (physical) server, running Windows Server (currently 2012 R2, but it can be changed to another version of the Standard edition). I have a custom Windows service that accesses a database. I'm running the Web…
uncaged
  • 111
  • 3
1
vote
1 answer

How to build a virtual machine in an encrypted container with virsh

I would like to use the volume encryption mechanism of libvirt. However, I was unable to find information about how to use this feature when running virt-install. How do I pass the related options? Edit 1 Based on the answer by Cole Robinson, I…
DoRe
  • 41
  • 5
1
vote
2 answers

Passwording an external hard drive on Windows Xp/Vista

Was wondering if there is a way to protect the contents of an external hard drive on windows Xp/Vista? Is it possible to password an external hard drive, such that when its plugged to a system, a password will be required to access it? Thanks.
user16906
1
vote
1 answer

How to encrypt AWS root volumes via Terraform

There doesn't appear to be an option to encrypt the root volumes via terraform. Any recommendations on how to do it?
KiaraNoyi
  • 11
  • 1
1
vote
1 answer

Proxy decrypting and serving remote encrypted resources

Imagine the following scenario: Host A serves via HTTP hello_world.jpg, which has been AES-encrypted. Host B, which acts as a proxy being aware of Host A's resources, responds to a HTTP call by fetching and decrypting hello_world.jpg. Is there any…
1
vote
2 answers

Digital Signatures Using Entreprise PKI

We are a global entreprise with thousands of employees worldwide. We have our own PKI infrastructure which is trusted internally by our systems but unknown externally. We sign contrats with our clients. There is an ongoing "paperless" project which…
lisa1987
  • 881
  • 1
  • 9
  • 17
1
vote
0 answers

AES-256-CBC with Sha512 and Encrypt-then-MAC Questions

I have to encrypt and decrypt csv-files with the following specifications: Cipher: AES-256-CBC MAC: SHA-512 Method: Encrypt-then-MAC I am working on an Ubuntu Bionic and I have root acceess. 1.) Which would be the simplest setup to do this? Is this…
1
vote
0 answers

Should I encrypt connections within my docker network to improve security?

Setup information: My current docker setup consists of the following containers: proxy and load balanceing server (HAproxy) http server (apache) multiple websocket servers (ratchet php) database server (mariadb) In my docker-compose.yml file I…
1
vote
1 answer

Multiple files encrypted with multiple GPG keys - how to easily add/remove/manage keys, automate key change tasks?

We have a bunch of files that contain sensitive information, that need to be accessed by several teams, but need to be unreadable to everyone else. Currently, each team member needs to generate their own GPG key pair and share their public key with…
Florin Andrei
  • 1,208
  • 1
  • 12
  • 18
1
vote
0 answers

in pfsense, its possible to secure the conf.cf (primary configuration file)

I want to give someone a solution based on embedded pfSense. That solution has modifications in pfSense, which I don't want anyone to steal and use it for their own business. its proprietary solution that i built to provide services based on…
Farhan
  • 4,269
  • 11
  • 49
  • 80