Questions tagged [encryption]

Encryption is transforming information through a cipher to protect it from unauthorized access.

Encryption is the process of taking some information (the plain text), and transforming it (usually with a cypher and a key) so that it is secure. Assuming a sufficiently strong cypher and key have been chosen, this cyphertext can be shared widely, without the information being compromised.

The reverse of Encryption is Decryption, where the process is reversed (normally by someone holding the key and cypher details) to return the information.

See the Wikipedia Page for more details.

775 questions
6
votes
1 answer

Can I encrypt a whole pool with ZFSoL 0.8.1?

I have compiled ZFS 0.8.1 for my server, and it is running fine. I am also able to create encrypted filesystems like mypool/myencfs. However, mypool is also a filesystem, and it seems that I cannot enable encyption on it: zfs set encryption=on…
mcandril
  • 295
  • 3
  • 13
6
votes
1 answer

Can I recover a bitlocker encrypted drive offline?

Windows 10, server 2012 R2 domain I'm confused about the options for recovering a bitlocker encrypted drive offline. Lets say I'm encrypting the HDDs of domain computers with bitlocker using TPM (not storing the keys on usb/floppy drives) and…
red888
  • 4,183
  • 18
  • 64
  • 111
6
votes
7 answers

Windows Server - any way to prevent file encryption?

I'm not talking about EFS or Bitlocker here. I'm asking if there's a way to prevent files from being encrypted. I'm referring to some extent to ransomware, but specifically I want the following scenario: Windows File server w/ shares (on the E:…
TheCleaner
  • 32,627
  • 26
  • 132
  • 191
6
votes
4 answers

How secure are wireless networks?

If I'm on an open wireless network, can a 3rd party capture packets and see all the internet traffic to and from my computer? What if WPA encryption is used, but someone has the key already? If I use HTTPS, can someone with direct access to the…
Lin
  • 2,909
  • 7
  • 27
  • 25
6
votes
3 answers

General GnuPG tips

Prompted by the recent vulnerability in SHA-1 and admonitions to begin the process of moving away from that hash function, I'm playing around with GnuPG again. I was just wondering how other folks use the system. Use these questions as prompts,…
Drew Stephens
  • 662
  • 7
  • 12
6
votes
4 answers

Are 128 and 256bit AES encryption considered weak?

Are 128 and 256bit AES encryption considered weak? I wanted to archive files and i figure i can write an app to automatically do it with winrar or 7z. Winrar uses AES-128 and 7z uses AES-256. I was wondering if that's easily breakable now that the…
user274
6
votes
2 answers

Should I encrypt my VPS' harddrive?

Is it feasible to remotely encrypt the hard drive of a virtual server (VPS, cloud server like EC2)? This would help to protect the contents of the hard drive from snooping by the host or as a result of a security hole, but has some issues: The…
Tom Marthenal
  • 2,116
  • 7
  • 25
  • 37
6
votes
3 answers

Can Windows log CryptoAPI CRL timouts?

I suspect that the process of building the CRL cache may cause latency in some applications. We have several .NET applications that occasionally "act slow" with no CPU or disk access. I suspect that they are hung up on authentication when trying to…
makerofthings7
  • 8,911
  • 34
  • 121
  • 197
6
votes
1 answer

VPN Encryption Domain

I'm trying to connect to a counterparty using VPN IPsec. I have a standard cable broadband connection with a single static IP address. The counterparty have asked me for my "Public IP Address Assigned to VPN Device" and also my "Encryption…
DD.
  • 3,114
  • 11
  • 35
  • 50
6
votes
2 answers

Sending HIPAA compliant e-mails

At a small office, my clients' HR department needs to communicate with some vendors regarding HIPAA-covered material. How do most companies deal with securely sending e-mails regarding HIPAA. I would prefer to encrypt the e-mails themselves…
Brett G
  • 2,033
  • 2
  • 28
  • 45
6
votes
3 answers

At rest encryption with a SAN?

I would like to make sure at-rest encryption is done in one place and correctly. If there's shared storage, that seems like the right place rather than DAS. Mainly I'd like to cover the case of drives being recovered without keys and the keys be…
6
votes
5 answers

Truecrypt or LUKS?

My work requires my laptop hard drive (running Linux) to be encrypted and from what I can tell TrueCrypt and LUKS seem to be the two major contenders out there. In a "normal" system, if the system crashes (power gets cut, etc), it's easy to recover…
user36696
6
votes
1 answer

AWS Root volume Encryption

In my scenario, I have some old EBS volumes that are not encrypted. To satisfy new corporate security measures, all data needs to be encrypted so I need to compile a plan to encrypt the unencrypted in the least disruptive way (Ideally with no…
5
votes
2 answers

If you connect remotely to another Windows machine with PowerShell, is it encrypted like ssh?

Are remote PowerShell connections encrypted / secured in some form the way that SSH is?
leeand00
  • 4,869
  • 15
  • 69
  • 110
5
votes
2 answers

Multiple VLAN's - Multiple SSID or Single SSID and Multiple VLAN's (radius)

I have a question regarding best practice. I have a case where i need multiple VLAN's in wireless networks. What is more performant? Having multiple SSID and each of them have a VLAN (this also mean that they will be on the same chanell on that…
George Farcas
  • 53
  • 1
  • 3