Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
1
vote
1 answer

How to export GPG key without user interaction?

I use GPG keys to encrypt backups with duplicity, so I would like to export the key after it is generated, so I can move it to a backup location in case the server burst into flames. Is there any way to export the secret key without user…
user497477
1
vote
2 answers

How to properly add a trusted SSL certificate to webpage?

I was trying to follow godaddy's instructions on how to add ssl certification for an nginx server on centos. On the last step (10) I was getting a "key mismatch" error. With some research i found that by sigining the .crt with my key, that error…
Makogan
  • 113
  • 3
1
vote
1 answer

How to send encrypted message using postfix?

I have some application on ubuntu 18.4 vps. i can send mails using postfix but gmail says it is not encrypted. postfix config file is: # See /usr/share/postfix/main.cf.dist for a commented, more complete version # Debian specific: Specifying a…
chimia
  • 28
  • 1
  • 4
1
vote
1 answer

shasum returns an incorrect result

Calculating SHA256 gives me an incorrect result when I'm using "shasum": $ echo "abcd" | shasum -a 256 fc4b5fd6816f75a7c81fc8eaa9499d6a299bd803397166e8c4cf9280b801d62c - # or $ echo abcd | shasum -a…
gadded
  • 11
  • 1
1
vote
2 answers

Information needed on availability of RAID controllers that have hardware encryption capability

I am somewhat familiar with the RAID controller card offerings in Dell servers, such as PERC H730P in their PowerEdge servers. And also some of the LSI 9xxx series RAID controller cards, that allows RAID configuration of 8,16, or 24 SAS/SATA…
ron
  • 805
  • 3
  • 11
  • 21
1
vote
1 answer

e-mail encryption during transfer

for the sake of simplicity i want to visualize the dangers of sending an unencrypted e-mail. I'm just not sure WHO can read unencrypted e-mails. Lets say i'm using Office365 as mail provider and i send an e-mail using my local Outlook client. The…
1
vote
1 answer

HAProxy-Apache encrypt connection

I have haproxy_server and apache_server in different datacenters, what is the best way to have encrypt connection between them? It’s working with the certbotand with the following configuration: frontend http_front bind…
pata2004
  • 11
  • 4
1
vote
1 answer

Securely encrypt backup for postgres DB

I do not want to encrypt my postgres DB. However, I want encryption at OS level, such that if the files(such as backups or configurations) are moved to any other system, it should be unreadable or non modifiable for security reasons. I tried…
1
vote
0 answers

"Windows does not appear to be on the drive from which it boots". Veracrypting corporate laptops

I work on the Help Desk of an org. I have been encrypting laptops with VeraCrypt for months now, but suddenly running into the message above in the title. The laptops getting this error don't have multiple drives. They have one C: and its listed as…
WakeDemons3
  • 185
  • 6
1
vote
2 answers

Database encryption or drive encryption

I'm thinking about encrypting the database that contain sensitive user data. Is it better for performance to encrypt the entire drive by using something like bitlocker or is it better to just encrypt the database using the built-in encryption in SQL…
Ryan
  • 13
  • 3
1
vote
1 answer

Setting "Store passwords using reversible encryption" to disabled

The setting "Store passwords using reversible encryption" is enabled in our domain and we need to revert this. What happens when this is changed? Will all passwords be encrypted? Or will all users be forced to change their password for it to be…
1
vote
2 answers

Difference between SSL VPN tunneling and SSL in HTTPS

I'm a beginner, and this is probably an elementary question, but I can't figure it out through some googling. I'm learning about VPN tunneling right now, and am generally not clear on how VPN tunneling is different than any other encryption, but…
1
vote
0 answers

How to encrypt Samba traffic?

How would I create encrypt the traffic that Samba communicates between the server and the client? My settings without encryption look like this: /etc/samba/smb.conf: [global] workgroup = WORKGROUP server string = %h server (Samba, Bananian) …
Socrates
  • 261
  • 4
  • 13
1
vote
1 answer

Nginx ciphers settings

I am trying to understand ciphers settings in nginx. ssl_protocols TLSv1 TLSv1.1 TLSv1.2; #What TLS types that are supported ssl_prefer_server_ciphers on; #Use the type that the server prefers ssl_ciphers…
Araw
  • 113
  • 6
1
vote
0 answers

Bitlocker on Hyper-V server

I have installed Hyper-V server on my new machine and then I added the Bitlocker function and initialized TPM. Now, I am trying to enable Bitlocker on the HDD. I need: encryption key saved on TPM recovery key saved on USB flash key will be…
Vilican
  • 129
  • 1
  • 21