encryption

0

WPA2 is vulnerable (hole196)

https://en.wikipedia.org

Do you think your wireless communications are secure? Think again. There is a vulnerability built into the WPA2 protocol itself! It's based on abusing the GTK (Group Temporal Key) and can be used to create man-in-the-middle and denial-of-service attacks. Too few people know this.

Read more »
spanky's picture
Created by spanky 8 years 49 weeks ago – Made popular 8 years 49 weeks ago
Category: High End   Tags:
0

How To Encrypt Mails With SSL Certificates (S/MIME)

http://www.howtoforge.com

This article is about how to use the S/MIME encryption function of common e-mail clients to sign and/or encrypt your mails safely. S/MIME uses SSL certificates which you can either create yourself or let a trusted certificate authority (CA) create one for you.

Read more »
falko's picture
Created by falko 10 years 24 weeks ago – Made popular 10 years 23 weeks ago
Category: End User   Tags:
0

Encrypt Early, Encrypt Often!

http://drdobbs.com

Even if you have done nothing wrong, the government agencies examining your files have no contractual obligation to you to keep them safe, nor even to get rid of all their copies once they've determined you're not guilty or that they pulled the wrong party's data.

Read more »
lozz's picture
Created by lozz 10 years 41 weeks ago – Made popular 10 years 41 weeks ago
Category: Legal   Tags:
0

Install Mageia 1 on an encrypted LVM file system

http://www.linuxbsdos.com

Mageia is a new Linux distribution formed by former employees and contributors of Mandriva, a Linux software provider and publisher of a line of Linux distributions of the same name. The first stable release (of Mageia) has since been reviewed for this website (see Mageia 1 review). This article presents the steps necessary to install it on an encrypted LVM file system.

Read more »
finid's picture
Created by finid 10 years 47 weeks ago – Made popular 10 years 47 weeks ago
Category: Beginner   Tags:
0

The Message of Firesheep: "Baaaad Websites, Implement Sitewide HTTPS Now!"

https://www.eff.org

Firesheep demonstrates a security flaw that the computer security community has been concerned about for years — that any network eavesdropper can take over another user's session (say, a login to a webmail or social networking account) just by sniffing packets and copying the victim's cookie

Read more »
lozz's picture
Created by lozz 11 years 30 weeks ago – Made popular 11 years 30 weeks ago
Category: End User   Tags:
0

Government Seeks Back Door Into All Our Communications

http://www.eff.org

The New York Times reported this morning on a Federal government plan to put government-mandated back doors in all communications systems, including all encryption software.

Read more »
lozz's picture
Created by lozz 11 years 34 weeks ago – Made popular 11 years 34 weeks ago
Category: Legal   Tags:
0

How to install PC-BSD on an encrypted ZFS file system

http://www.linuxbsdos.com

As a desktop distribution built atop FreeBSD, PC-BSD makes available to the desktop user all the cool technologies inside FreeBSD. One of those cool technologies is ZFS, the Zettabyte File System, a file system developed by Sun Microsystems (acquired by Oracle Corporation) for the Solaris operating system. ZFS has no parallel in the Linux/BSD world.

Read more »
finid's picture
Created by finid 11 years 38 weeks ago – Made popular 11 years 38 weeks ago
Category: Beginner   Tags:
0

Disk Encryption on Sabayon 5.3

http://linuxbsdos.com

So how easy is it to configure full disk encryption on Sabayon 5.3? Very, very easy. Just follow the directions outlined below.

Read more »
a known eMouse's picture
Created by a known eMouse 11 years 47 weeks ago – Made popular 11 years 47 weeks ago
Category: High End   Tags:
0

Creating Encrypted FTP Backups With duplicity And ftplicity On Debian Lenny

http://www.howtoforge.com

When you rent a dedicated server nowadays, almost all providers give you FTP backup space for your server on one of the provider's backup systems. This tutorial shows how you can use duplicity and ftplicity to create encrypted backups on the provider's remote backup server over FTP.

Read more »
fsq1984's picture
Created by fsq1984 12 years 4 weeks ago – Made popular 12 years 4 weeks ago
Category: High End   Tags:
0

Removable disk encryption with dm-crypt/LUKS

http://segfault.in

dm-crypt is a device-mapper target that provides transparent encryption of block devices using the new Linux 2.6 cryptoapi.

Read more »
vinodvm's picture
Created by vinodvm 12 years 9 weeks ago – Made popular 12 years 8 weeks ago
Category: Beginner   Tags:
0

How To Set Up MySQL Database Replication With SSL Encryption On CentOS 5.4

http://www.howtoforge.com

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave).

Read more »
falko's picture
Created by falko 12 years 14 weeks ago – Made popular 12 years 14 weeks ago
Category: End User   Tags:
0

How To Set Up MySQL Database Replication With SSL Encryption On Ubuntu 9.10

http://www.howtoforge.com

This tutorial describes how to set up database replication in MySQL using an SSL connection for encryption (to make it impossible for hackers to sniff out passwords and data transferred between the master and slave).

Read more »
falko's picture
Created by falko 12 years 15 weeks ago – Made popular 12 years 15 weeks ago
Category: End User   Tags:
0

Open-Source Effort to Hack GSM

http://spectrum.ieee.org

If you're still using a cellphone based on early digital standards, you better be careful what you say. The encryption technology used to prevent eavesdropping in GSM (Global System for Mobile communications), the world's most widely used cellphone system, has more security holes than Swiss cheese...

Read more »
GiTS's picture
Created by GiTS 12 years 24 weeks ago – Made popular 12 years 24 weeks ago
Category: High End   Tags:
0

Beware Open Source Encryption

http://www.ddj.com

There's nothing like an official letter from the U.S. Department of Commerce's munitions control office to make you choke on your morning coffee. At least that was my response upon receiving such a notice.

Read more »
FFlover's picture
Created by FFlover 12 years 30 weeks ago – Made popular 12 years 30 weeks ago
Category: High End   Tags:
0

Ubuntu’s Encrypted Home Directory: A Canonical Approach to Data Privacy

http://www.linux-mag.com

How can users protect themselves from the loss of important data when a computer goes missing? Well, the latest release of Ubuntu makes this not only possible, but frighteningly easy!

Read more »
kbcornwell's picture
Created by kbcornwell 12 years 30 weeks ago – Made popular 12 years 30 weeks ago
Category: End User   Tags:

Best karma users