Linux Cryptography - Page 56
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Ex-NSA official and now Cylink CEO Bill Crowell is reviving the software maker and helping to bridge the government-industry divide. William Crowell doesn't look like what you'd expect. Espionage expert? Give me a break. Silicon Valley executive? No way. The 59-year-old . . .
Speaking at the Black Hat Security Conference, a noted cryptography expert predicts a gloomy future for online security. Cryptographer and security expert Bruce Schneier (seen here in an earlier photo) gave one of the opening keynotes Wednesday. In it, he argued . . .
The United States on Monday announced an update to its encryption export policy affecting companies that sell encryption software to users in the 15 European Union nations and in eight other countries that are U.S. allies.
The United States has eased its rules on exporting encryption products to the European Union and other key trading partners in an effort to improve security in cyberspace and promote electronic commerce, the White House said today. Under the new policy, . . .
Enter SSH (Secure SHell). By using SSH, you encrypt the traffic and you can make 'man-in-the-middle' attacks almost impossible. It also protects you from DNS and IP spoofing. As a bonus, it offers the possibility to compress the traffic and thus . . .
TORONTO--A developer of wireless banking software is partnering with a security software maker to create what they say is a way people can avoid the bank manager's office when they sign mortgages or buy insurance.
Once upon a time, a Finnish programmer named Tatu Ylönen developed a networking protocol and attendant software called SSH, short for Secure SHell. Not having spoken to Mr. Ylönen, I know nothing about his precise motivations at the time, but the . . .
Is the FBI blocking privacy-equipped browsers from its website? The question goes unanswered a week after users of a commercial privacy service found themselves unable to access the Federal Bureau of Investigation's fbi.gov site.
The law that President Clinton signed last week allowing businesses and consumers to seal a wide variety of legally binding arrangements with electronic rather than handwritten signatures raised the speed limit on e-business development, analysts say.. . .
A colleague recently asked if I could help him understand the Diffie-Hellman key exchange protocol... without digging through the math. My answer was "Yes I can, but not easily." Doing so requires a few diagrams because, in this particular case, a . . .
With a few strokes of the presidential pen -- and the symbolic use of a smart card -- electronic signatures have gained the same legal status as those written in ink on paper. . . .
President Clinton used both a smart card and an old-fashioned pen today to give digital signatures the force of law. By signing the Electronic Signatures in Global and National Commerce Act, the president made it possible for Americans to sign some . . .
A recent report by the Underground Security Systems Research group identifies a weakness in the PGP Certificate Server code that can allow a malicious user to crash the authentication server. Network Associates has released a patch that prevents this particular vulnerability. . . .
The world of James Bond may be inching toward reality. A new generation of biometric devices -- gadgets that identify you by scanning your face, fingerprint, or voice, have a distinctly futuristic look and feel, but have yet to make much . . .
Installing and managing a PKI (public key infrastructure) have far-reaching implications in an enterprise. A PKI by itself offers no value until it is paired with applications and services designed to leverage its functionality. Briefly, a PKI needs to issue digital . . .
This article "looks at a template-driven site that uses Server Side Includes (SSI) to build up the pages. Understanding the basics of SSI will help us to understand how to use and employ templates in just but about solution." We'll use . . .
Is your paycheck automatically deposited into your account by your employer? Do you pay any bills by automated debit? If so, you are a regular user of one of the most important and least-known networks in the world, the Automated Clearing . . .
Canada's Kasten Chase has been given the exclusive go-ahead by the U.S. National Security Agency to safeguard top-secret government data, which could make the recent theft of computer hard drives laden with nuclear secrets from . . .
Thanks to a measure approved by Congress and headed to President Clinton's desk for his signature, Web surfers and e-mail users will soon be able to put a legally binding digital version of . . .
Scientists at the Department of Energy's Los Alamos National Laboratory and other research organizations around the world are harnessing the laws of quantum physics to develop what they hope will be impregnable data encryption systems.. . .