Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
1
vote
1 answer

Disable read/write workqueue for Ubuntu Full-Disk-Encryption

I am currently trying to set up multiple devices with Ubuntu (20.04.5 LTS) and the drive must be encrypted, so I used LUKS during the installation. (I checked "Use LVM with the new Ubuntu installation" + "Encrypt the new Ubuntu installation for…
Pascal Diu
  • 11
  • 1
1
vote
1 answer

How to generate kerberos traffic?

I'm trying to verify the encryption types allowed for kerberos by viewing packet captures in order to prepare to remove support for RC4 with kerberos. Does anyone know what I can do on Windows Server machines to generate some kerberos traffic that…
Roman
  • 405
  • 1
  • 7
  • 21
1
vote
1 answer

LDAP SSSD SHA-512 authentication failure

I have a server with helm-openldap and a debian client. I can't login to a user who has a SHA-512 encrypted password. If i store it in clear or MD5, it works perfectly. $ id tuser uid=5000(tuser) gid=5000(tuser)…
ange
  • 13
  • 3
1
vote
0 answers

Why is this SSH handshake failing?

The server logs this 2021-12-07 21:57:29.889029102 Server listening on 0.0.0.0 port 2222. 2021-12-07 21:57:29.889033114 Server listening on :: port 2222. 2021-12-07 21:57:30.635958078 Connection from 172.17.0.1 port 56406 on 172.17.0.3 port 2222…
conorgriffin
  • 459
  • 1
  • 6
  • 25
1
vote
3 answers

Need options for remote encrypted network connection software other than VPN

Trying to help setup a network connection for a telecommuter. We went through a bunch of attempts with VPN on our Linsys router and in Server 2003 with out success. All IT people in our small company are software guys, including myself, with no…
dmr83457
  • 727
  • 3
  • 9
  • 20
1
vote
1 answer

Does Microsoft Official RDP Program end to end encrypt data?

For example, me RDP Client --connect to--> a Linux ServerA 1.1.1.1:3388 --iptables_Port_Forwarding--> a Windows ServerB 2.2.2.2:3389 Then, Is the part of me RDP Client >-to-> the Jump ServerA 1.1.1.1:3388 also Encrypted by RDP(TLS), or not like…
rm -rf
  • 55
  • 6
1
vote
2 answers

Are Windows GPOs encrypted?

We have a piece of COTS software that has a command line tool for server credential rotation. Instead of going to each machine to rotate the credentials with the tool, I would like to use GPO to run a script to do so. However, I would need to place…
scmccart
  • 111
  • 1
1
vote
2 answers

Hardware token/UUID for authentication of software

Is there a unique hardware token or a UUID on every computer motherboard/BIOS that can be used to create a "strongly coupled" software? I am working on writing a proprietary software for a client and I can't afford anyone to create copies of the…
Cyberpks
  • 113
  • 3
1
vote
1 answer

Windows 7 encrypting downloaded files

For some reason, I have several Windows 7 installs which are encrypting files that have been downloaded from another location (I have seen this behaviour through both IE, Firefox and Outlook) - the file names are green, and on checking their…
Moo
  • 2,244
  • 21
  • 23
1
vote
2 answers

Is VPS Disk Encryption pointless?

It's relatively straight-forward to create an encrypted storage volume (e.g. Like so: https://www.digitalocean.com/community/tutorials/how-to-create-an-encrypted-file-system-on-a-digitalocean-block-storage-volume .) However, since the filesystem is…
Glenn
  • 35
  • 2
  • 7
1
vote
1 answer

How to set up a secure system to allow only specific clients to access specific services on a server?

Preface Please bear with me if I use incorrect terminology or don't express the problem too well since I'm not an expert on system administration/server maintenance. Let me know/correct me if I do so I can learn and clarify my points. Problem I have…
nicoty
  • 111
  • 4
1
vote
2 answers

Is all web traffic sent over http/https protocol?

I was wondering what were the differences (security-wise) between VPN encryption and HTTPS encryption, and I found this article: https://surfshark.com/blog/vpn-vs-https According to this blog, HTTPS is not that secure since it only encrypts "…
1
vote
2 answers

Possibilities to protect network traffic in datacenter without adding much latency

I am looking for possibilities (and their pros and cons) for protecting network traffic of the components of a a time-critical application in a data center. The aim is minimizing the damage an attacker can cause if he manages to compromose a VM. It…
Hauke Laging
  • 5,285
  • 2
  • 24
  • 40
1
vote
1 answer

nginx server that only proxies to my game servers

I have clients connecting to my WebSockets game server for an online browser game. Game servers are created and destroyed when players start games, and so each server can have a different IP address that I can’t control. I need the WebSockets to be…
edbentley
  • 13
  • 4
1
vote
2 answers

Encrypting MSMQ

So I want to do asynchronous, disconnected, across-the-Internet messaging with WCF. Probably due to my background in Apache ActiveMQ, I'm looking at MSMQ for this. In ActiveMQ, it was a simple thing to encrypt a queue connection; you simply chose an…
Kyle
  • 1,859
  • 2
  • 17
  • 23