Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
1
vote
1 answer

Htaccess problems when coming from a truecrypt container

I was messing with one of my sites' .htaccess files and got it working as desired. Then I was finished working on it so I moved it to my encrypted container (TrueCrypt). Later on I wanted to change some things so was modifying the .htaccess…
bMon
  • 253
  • 1
  • 9
1
vote
4 answers

Understanding Security Certificates (and their pricing)

I normally used self-signed certs, however now I need a proper one at absolutely minimal cost. Since creating a "certificate authority" with makecert really just means creating a public/private key pair, it seems pretty clear that creating a…
1
vote
1 answer

mount server as external encrypted HD?

i have a few projects using git and i'd like to have a remote backup available in case our network goes down. I know how to create a bare git repository and push to it but how do i encrypt the contents so no one but us can see the source? I am…
user274
1
vote
1 answer

How do I replicate a sha256 hash with salt using OpenSSL command line?

Using PHP's crypt function as follows, I can do a sha256 hash with salt and multiple rounds. php -r "echo crypt('foo','\$5\$rounds=5000\$saltsaltsaltsalt');" produces: $5$rounds=5000$saltsaltsaltsalt$5RbfsOruKYb8v7hGn29A.I91maopNeJ2nIFH.SIEnSC How…
Tim
  • 584
  • 2
  • 9
  • 20
1
vote
2 answers

How to proxy and encrypt all my internet traffic with Win7 and Win2008R2?

I have a Windows 7 laptop and a Windows 2008 R2 server. How can I encrypt and route all my internet request from the Win7 laptop to the Win2008R2 server? I guess the server would be called a proxy? Goal is to prevent unencrypted network snooping. I…
Malartre
  • 321
  • 2
  • 5
  • 13
1
vote
1 answer

Defrag a drive encrypted with Whole Drive Encryption

I am running Windows Vista where the entire system drive has been encrypted using Truecrypt 6.2 Whole Drive Encryption (WDE). I was wondering whether defragging a drive which is encrypted with WDE would yield the same results as a non-encrypted…
kpax
  • 195
  • 1
  • 3
  • 7
1
vote
2 answers

Network layer encryption

what are the advantages and disadvantages of network layer encryption?
Kourosh Samia
  • 321
  • 1
  • 5
  • 12
1
vote
4 answers

Remotely enter encryption key?

This might be a really dumb question but here goes, anyway. I just bought a couple servers. I already installed Ubuntu with encrypted LVM on one and I'm planning on doing the same with the other. This means that every time I boot up each of these…
Jason Swett
  • 1,468
  • 5
  • 23
  • 37
1
vote
4 answers

Encypted backups

I realize some form of this question has been asked many times before but none of the answers I've seen are really what I'm looking for. I have a server that I'll call S and a backup machine that I'll call B. Right now, S has whole disk encryption…
Jason Swett
  • 1,468
  • 5
  • 23
  • 37
1
vote
3 answers

Encrypt entire Linux drive with TrueCrypt

I've found plenty of info online about how to encrypt a drive with TrueCrypt, but everything I found was either outdated or not for Linux. Here's what I'm after: I want to encrypt my entire drive (except, of course, the part[s] of it I CAN'T encrypt…
Jason Swett
  • 1,468
  • 5
  • 23
  • 37
1
vote
4 answers

How to direct Apache Basic authentication over SSL?

Our intranet use mod_ldap to authenticate users to our internal Active Directory server as follows: AuthType Basic AuthName "***" AuthBasicProvider ldap AuthLDAPUrl "***" require valid-user We want…
Brent
  • 22,857
  • 19
  • 70
  • 102
1
vote
1 answer

Secured ad-hoc network with DD-WRT

I'm able to create ad-hoc networks using DD-WRT but password doesn't work. Is there a workaround?
Eduardo
  • 147
  • 2
  • 8
1
vote
4 answers

Checkout Laptops Imaging and Encryption

We have about 20 laptops (windows xp or 7) that we're getting ready for checkout at a library. People will be using these laptops anywhere from 1 day to 3 months. We have a few issues because of new policies enacted at our institution. First of…
Pablo
  • 11
  • 1
1
vote
5 answers

Performance problems with Credant desktop encryption, is uninstall an option?

I'm having a performance problem with Credant when accessing a lot of files, such as during a code compile. What happens is that on my dual-core box the combined CPU hits 50% and the "system" part (the red part of the performance graph in…
Ed Griebel
  • 121
  • 1
  • 7
1
vote
1 answer

Simple PHP encryption

I'm looking for an asymmetric encryption library for php that can generate keys, hand out public keys and decrypt incoming messages with the corresponding private key. However, I'm a novice in the field of encryption and while googling for a usable…
Filip