URL parameters or query strings are often used to carry information that can be used by hackers to do identity theft or other unpleasant things.
White Papers Crack Encryption, RSS Issues
Encryption usage by the federal government needs to be defined better, while GeoRSS offers the promise of geo-enabling RSS feeds with location information.
OS X File Encryption
I’m going to look at two methods for encrypting files on Mac OS X. The first is built in, and uses DisK Utilty to create an encrypted disk image.
How To Deal With Wireless Encryption Security Threats
Because nobody wants to compromise the integrity of their network by having some hacker “borrow” your bandwidth or gain access and start snooping around you need to lock down your network.
Overview of XML Encryption
XML encryption classifies a course of action for encrypting plain text data, generating ciphertext, and decrypting the ciphertext to retrieve the plaintext data.
What is the Point of Encryption if you Don’t Know Who For?
Phishing is the fastest growing threat in the history of Internet and has gained immense popularity amongst Internet fraudsters and hackers as a simple yet effective way to gain unsolicited access to confidential user information.
File and Email Encryption with GnuPG (PGP) Part Six
Last time I showed you how to exchange and verify public PGP keys with an individual. After you’ve verified a user’s key (KeyID, bits, type, fingerprint, and user’s actual identity) you should sign their key.
File and email encryption with GnuPG (PGP) part five
Verification is part of any security system. SSH, FTP, POP, and IMAP servers ask for your password before it lets you log into the machine, get your files, or snag your email. NTP can be configured to require keys before it’ll let you mess with it’s clock. CIFS requires a password or kerberos tickets before granting you access to shares.
File and Email Encryption With GnuPG (PGP) Part Four
GnuPG and other PGP implementations allow you to encrypt (scramble the data so only intended recipients can read it) and/or sign (provide proof that the data has been unaltered in transit). As you should remember, PGP keys are made up of two parts, a public key and a private key. The public key can (and in most cases should) be available to anyone – there’s no harm in allowing it out to the entire world. The private key should be kept somewhere secure, protected with a strong passphrase.
File and Email Encryption with GnuPG (PGP) Part Three
Last time[1] we’d created our PGP key. Let’s jump in with some encryption and decryption examples.