Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
0
votes
2 answers

network share encryption

what is the best practice to share network drives (samba or windows share based) with encryption? Simple PGP based key encryption? Or maybe with RSA token? Anybody, share your experience on this!
coolwater
  • 468
  • 3
  • 4
0
votes
1 answer

Disabling the AES cipher suites without ECDHE key exchange algorithm

Currently, we are having below cipher suites used in our platform. AES128-GCM-SHA256 AES128-SHA256 AES128-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA Post security scan, team has asked us to block the below…
chandu
  • 3
  • 1
  • 2
0
votes
4 answers

Best Encrypted Backup Solution for Windows and Linux servers

I am looking for advice, and hopefully there are people here with experience that have suggestions. I have a Linux SAMBA File Server that has financial data on it that I want to backup to a remote server. Also I have a Windows server with…
sxanness
  • 137
  • 1
  • 17
0
votes
1 answer

Details of certificate used to encrypt email received by Outlook

Is there a way of seeing the details of the certificate used to encrypt an email that was received by Outlook. I'm trying to diagnose an issue and want to see if someone has an out of date offline address book and so is using old certificates. Note…
Phil
  • 3,168
  • 1
  • 22
  • 29
0
votes
1 answer

Updating Expiring Keys - Azure OS Disk Encryption

Whilst day dreaming at my desk this morning, something occurred to me and I have not been able to find an answer of yet. So I am hoping someone may shine some light for me or just have a good discussion about it. Let me set the scene. Recently, I…
DGray94
  • 31
  • 5
0
votes
2 answers

Decrypting EFS w/o altering timestamp - possible?

I'd like to decrypt some EFS-encrypted files, but I do not know how to do that without altering the timestamp. When encrypting/decrypting files, the modified-time is set to the current time. I'd like to preserve the original timestamp, as the file…
grojo
  • 429
  • 1
  • 7
  • 18
0
votes
2 answers

Horde and Dovecot's SHA512-CRYPT: Cannot connect using custom SQL query

after successfully switching the authentification mechanism in dovecot and roundcube from MD5 to SHA512-CRYPT, I struggle to get Horde to authentificate using custom SQL queries. Setting $conf['auth']['params']['encryption'] = 'crypt-sha512'; does…
herrhannes
  • 53
  • 4
0
votes
0 answers

windows server 2016 hacked for the third time

hello everyone I'm using a windows server 2016 as web server that runs a WebLogic application on a specific port (7001) and I have almost done every thing I know or I read about on the internet to protect my web server using third party software…
omarzKH
  • 9
  • 2
0
votes
1 answer

operators in CipherSuite configuration for SSL

I have SSLCipherSuite configured as High:Medium:!aNULL:!eNULL:+High:+Medium Here I can understand to match or include the ciphers with triple DES (High) and 128 bit encryption (Medium) at start and then it ignores which are not authenticated and…
Sunny
  • 55
  • 6
0
votes
1 answer

LVM - Should I encrypt physical volumes or logical volume?

I have two hard drives and I'm about to build a backup system. Now I'm wondering which solution would be the best. I encrypt disk1 and disk2. After mounting these I create a volume group and logical volume? I mount disk1 and disk2. After this I…
japs
  • 1
0
votes
1 answer

End-End Encryption on SSH passing though 'untrusted' jump servers

I need to SSH between 2 "clients", both behind CGNATs, by using a third party server as a jump. This use case has been covered on this site already but: How do I make it so the SSH traffic is not readable to the Jump server; and stays end-end…
Dalhousie
  • 1
  • 1
0
votes
1 answer

Configuring Imported Self Signed SSL Certificate to SQL Server Express

I've created a self-signed certificate and configured with SQL Server Express. The encryption works fine on my PC. When I export the certificate to another PC I can import fine and can see the certificate in MMC under Personal >…
0
votes
1 answer

Encrypting properties with "eyaml edit" without a private key?

I would like to use eyaml edit to edit my Puppet/Hiera configuration files. My configuration files are a mixture of encrypted and plain text content. I want to use eyaml edit to encrypt certain properties. So initially my files will contain…
0
votes
1 answer

What is the data flow if using an HSM with an encrypted Database

How would someone implement an HSM if they wanted to encrypt all the tables of a database for example in a 3-tier environment? Does the app server query the DB, get the encrypted blob and ask the hsm to decrypt it? That seems like a lot of data for…
jouell
  • 621
  • 1
  • 5
  • 20
0
votes
0 answers

USB authentication and Encryption on Windows Environment

My boss ask me that he want to secure USB thumb drive usage on our company. He want the USB thumb drive data un-encrypted when some one authenticate to our Active Directory (AD) server whether locally or by VPN and will be encrypted if not…
dchochan
  • 105
  • 5