Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
1
vote
1 answer

File content is being modified sent over ftp

I am using openssl to encrypt my backups before send it to an ftp server where I store them. At first, when I tried to decrypt the files I was getting this error: openssl rsautl -decrypt -inkey ../key.server.pem -in enc.key.txt -out key.txt RSA…
1
vote
1 answer

Truecrypt Boot Volume - Keyfiles?

I am actively using keyfiles for non-boot partitions and files (containers?), but I am wanting to bring this into the full system with a boot partition containing my OS (Windows or Linux). However, I really like the security keyfiles offer against…
1
vote
2 answers

Cisco IOS Setting up a password/secret

I'm figuring out the basics to CISCO Ios commands and I am struggling to find out the answer to the following question: What would provide a better protection when you set up a password to allow privileged EXEC enable password blahblah service…
1
vote
2 answers

Office 365 E3 with Exchange Hosted Encryption (EHE)

I have a client who wants to move to Office 365. They are currently running on a trial of Office 365 E3 plan. My staff are now also using Office 365 E3 via the internal use licenses provided as part of the MS Cloud Partner benefits. We've search…
1
vote
2 answers

Installing linux on a McAfee Endpoint Encryption encrypted hard disk

Work have issued us all laptops - which is great but it has Windows 7 installed on it with McAfee hard disk encryption for security/insurance reasons. I use Ubuntu on my workstation although the IT department say that I cannot install Ubuntu as the…
StuR
  • 167
  • 2
  • 10
1
vote
0 answers

udev rule for disconnection and hibernate/suspend

I have an external hard drive which contains different GPT partitions. One of them is a LVM partition. This partition is contained in a LVM volume group (called "volga"), which in turns splits into many different logical volumes, one of them is…
qdii
  • 335
  • 2
  • 8
1
vote
4 answers

Novell Groupwise 7 to Google Apps LDAP Password

So I am attempting to Migrate all our user account information from Novell to Google Apps using Google Apps Directory Sync, one problem I've run into is Password Encryption Method, I have no idea what Novell uses or if I am even using the correct…
Xphacter
  • 81
  • 5
1
vote
2 answers

Secure a VMWare Image without Manual Password Entry

I stand before the following task: A VMWare "template" (based on SLES11) with custom software, that is to be distributed to some clients. They will receive a client specific copy of the template and should import it to their local ESX server. BUT!…
Kaffee
  • 111
  • 5
1
vote
0 answers

Expanding raid5 software raid

I have recently bought 4 2TB drives to expand my existing 4*2TB raid5 setup, using mdadm software raid in debian. As a initial step, I have created a raid5 on the four new drives and created an encrypted partition using cryptsetup and luks (not…
prinsen
  • 162
  • 8
1
vote
1 answer

Configuring encrypted e-mail in Outlook 2010

So we're setting up encrypted e-mail for our client running SBS with Exchange 2010 and Outlook 2010 on about a dozen machines (one running Outlook 2003, we're trying to talk them into upgrading it). It's new territory for me and my associate is only…
Thomas
  • 890
  • 4
  • 18
  • 37
1
vote
1 answer

MariaDB + PAM: Is Remote Auth Secure?

I have a MariaDB instance which is using PAM to auth against Active Directory. Is remote authentication with this service secure? I ran a Wireshark trace during the auth process, and passwords are not sent in the clear, but how secure is the hashed…
Tony
  • 43
  • 5
1
vote
1 answer

Why are these dmsetup commands there?

On this page are there examples of LUKS encryptions. Example below. Why are the dmsetup commands there? What do they do? dd if=/dev/zero of=./volumes/vol_default.vol bs=1M count=1 losetup /dev/loop0 ./volumes/vol_default.vol echo…
Sandra
  • 10,303
  • 38
  • 112
  • 165
1
vote
1 answer

How to setup Samba4 to enable NTFS encryption?

I'm currently giving the sernet.de samba4 (rc1) appliance a shot (running inside vmware player on Windows 7). Providing a share is no problem, but the client still can't choose to encrypt files. What settings do need to be changed in the simplest…
Tobias Kienzler
  • 388
  • 1
  • 9
  • 28
1
vote
0 answers

Can samba authentication be coupled to file encryption? What about WebDAV?

I'd like my NAS (Buffalo LinkStation Pro running Linux 2.6.31.8 #1 Fri Jun 8 11:07:30 JST 2012 armv5tel GNU/Linux) to share an encrypted filesystem to the Windows clients as transparently as possible. Currently, I have too SSH into the NAS and…
Tobias Kienzler
  • 388
  • 1
  • 9
  • 28
1
vote
2 answers

How can I remotely verify that a file is encrypted?

Is there any way to remotely verify that a file is encrypted? I have a very complex problem, but here's a simplified scenario that illustrates the point: I have a server that generates very large video files. I want these to be encrypted at the…