Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
0
votes
0 answers

Encrypting SVN Store with ecryptfs

I previously had TrueCrypt setup to automount my SVN repos on the Subversion server at boot with an automated network script that used a keyfile on a protected share to mount the volume. Now that TrueCrypt is no more, I've since moved on to using…
Cloud
  • 425
  • 3
  • 13
0
votes
2 answers

How to disable Null and Weak Ciphers on 389-Directory-Server

I am running 389-DS on CentOS. Version - '389-ds-base.i686 1.2.11.15-34.el6_5'. Security scans revealed that NullCiphers were found on Port 389 and 636. I tried to disable them by shutting down DS, editing the 'nsSSL3Ciphers' on all…
Quest Monger
  • 189
  • 2
  • 4
  • 12
0
votes
1 answer

How to re-create the symmetric key on Amazon RDS

We have some column encrypted by symmetric key. Now we want to upload our database to Amazon RDS (SQL Server). Can we do that? If yes, how?
Delta76
  • 485
  • 8
  • 18
0
votes
1 answer

Is OTR required for XMPP message encryption?

I use XMPP for sending instant messages from a bot in a server to a laptop client. I have full control of both the clients (bot and laptop client) and they are both connected to the same server which I have setup myself and I have full control of…
atrias
  • 88
  • 5
0
votes
1 answer

Problems saving encrypted emails from Outlook into Document Management System

We use a commercially available Document Management System (DMS) which integrates with Microsoft Outlook 2010. This allows users to save important emails in the DMS so that their colleagues have access to them as well. At the request of a 3rd party,…
0
votes
2 answers

How to recover key after using LuksRemovekey?

I have an encrypted partition on /dev/sda5, yesterday I use cryptsetup to remove the encryption using cryptsetup luksRemovekey /dev/sda5, but when I restart I have to provide a passphrase for decryption ? (I use the old one but I have this message :…
midobAck
  • 1
  • 1
0
votes
1 answer

Moving data across countries securely

Currently I am planning on moving data from a number of remote sites across to our head quarters in Germany. The data is too large to replicate/copy over site to site VPN so I'm going to have to do this physically. However I'm struggling to find…
CharlesH
  • 344
  • 2
  • 13
0
votes
0 answers

How to solve problematic cpu load due to encryption when using SFTP on a VM

my company is trying offer a sftp service for a big amount of customers. The serving machine will be on a VM and tests have shown that, with an increasing amount of simultaneous users, the cpu becomes heavily utilized solely by doing the connection…
PhilippN
  • 63
  • 1
  • 3
0
votes
1 answer

Move encrypted debian system on luks+lvm with dropbear from single SSD to SSD-RAID1

We have a debian linux server which has a single 120GB SSD and 2x2TB HDDs as RAID 1. We now have to move to another server which has 2x240GB SSD and a single 2TB HDD. The aim is to move the current 120GB system drive SSD to a 240GB RAID1 SSD and…
mr.simonski
  • 247
  • 4
  • 13
0
votes
1 answer

Logging remote commands sent during SSH session, so the log would be unencrypted

I connect to server A (running OpenSSH server in Linux OS) using Putty: localhost% putty.exe A How to cause the SSH server to log the commands sent from localhost in unencrypted manner. Thanks
rok
  • 159
  • 8
0
votes
2 answers

Mac Encryption and Reporting

We have a requirement at my company to support Macs. The machines need to be encrypted and have some sort of way to check in with a management system to verify the encryption status. This can be summarized to encryption and reporting. Filevault,…
jsmickey
  • 101
0
votes
1 answer

Login to openvpn web GUI after change IP

My provider just changed my IP address. How can I login to my web GUI with my new IP address? Thanks in advance.
sg552
  • 409
  • 3
  • 5
  • 11
0
votes
1 answer

dmcrypt container on nfs

I'm setting up an encrypted file storage on a remote server and I want to be able to use it transparently on my system. I want to be able to de-/encrypt them locally so that the server hosting the files won't be able to see what is stored. (So I can…
0
votes
1 answer

Associate SSL certificate for SQL Server which does not use the FQDN

We would like to connect securely to SQL 2008 R2 over the internet for reporting purposes. Speed is not a huge concern for these smaller data sets, and users are going to be using simple reporting programs (e.g. Access) that require ODBC…
cninsd
  • 41
  • 1
  • 5
0
votes
1 answer

Ho to encrypt part of config data file?

I work in small company. When i am going on holiday i had to take root access to my junior. That junior could give access to another man. Unfortunately I can't control this proccess. I would like that they could't see more than they need. For…
Stepchik
  • 99
  • 4
  • 11