LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Cryptography
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



How to encrypt a partition with Cryptoloop  21 February 2013 
Source: Linuxcareer - Posted by Dave Wreski   
This article will describe how to encrypt entire partition with a Cryptoloop. Cryptoloop is a disk encryption module for Linux. It was first introduced in the 2.5.x kernel series.
 
User Data Encryption with FUSE-based EncFS filesystem  04 February 2013 
Source: LinuxCareer - Posted by Anthony Pell   
Any decent Linux distribution comes with an installation option to automatically encrypt user's home directory. In case you do not wish to encrypt the entire home directory or perhaps you wish to encrypt some random directories on your Linux system you can use EncFS the FUSE-based cryptographic filesystem.
 
Data encryption adds twist to ransomware  31 January 2013 
Source: CSO Online - Posted by Anthony Pell   
A new version of the well-known police ransomware takes the unusual step of encrypting files on the infected PC, so the malware cannot be easily removed.
 
Rogue Google SSL certificate not used for dishonest purposes, Turktrust says  07 January 2013 
Source: InfoWorld - Posted by Anthony Pell   
Turktrust, the Turkish CA (certificate authority) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate was not used for dishonest purposes.
 
Breaking Hard-Disk Encryption  31 December 2012 
Source: Schneier on Security - Posted by Dave Wreski   
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work?
 
China Now Blocking Encryption  20 December 2012 
Source: Schneier on Security - Posted by Dave Wreski   
The "Great Firewall of China" is now able to detect and block encryption: A number of companies providing "virtual private network" (VPN) services to users in China say the new system is able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems.
 
Encryption, not restriction, is the key to safe cloud computing  12 November 2012 
Source: NexGov - Posted by Anthony Pell   
It’s 11 p.m. Do you know where your data is? If your enterprise has transitioned to the cloud for data storage the answer almost certainly is “no.” Portions of it might be in Malaysia; other bits in Antigua.
 
How a Google Headhunter’s E-Mail Unraveled a Massive Net Security Hole  24 October 2012 
Source: Wired - Posted by Pooja Shah   
So he wondered if the e-mail might have been spoofed – something sent from a scammer to appear to come from the search giant. But when Harris examined the e-mail’s header information, it all seemed legitimate.
 
Attacking TrueCrypt  24 October 2012 
Source: H Security - Posted by Anthony Pell   
The open source TrueCrypt disk encryption tool is considered the to be the software of choice for systematically encrypting data. It is able to encrypt individual drives, such as USB Flash drives, and even entire hard drives. A small utility called TCHead is, however, able to tackle data encrypted using TrueCrypt.
 
How I Accidentally Helped Compromise The Secret Keys Of High-Security Handcuffs  15 October 2012 
Source: Forbes - Posted by Dave Wreski   
In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security’s sake don’t stay secret for long. Especially, it turns out, when a reporter wielding an iPhone camera is around.
 
<< Start < Prev 7 8 9 Next > End >>

Results 61 - 70 of 1088
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.