Linux Cryptography - Page 35
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Italian police have seized at least two Psion personal digital assistants from members of the Red Brigades terrorist organization. But the major investigative breakthrough they were hoping for as a result of the information contained on the devices has failed to . . .
The chief executive of PGP Corporation, Phillip Dunkelberger, has hinted the company will release a secure instant messaging (IM) application following the re-launch of the brand in June last year. During a phone interview, Dunkelberger made reference to IM as an area that has significant potential for innovation.. . .
With the arrival of Windows Server 2003 we might be forgiven if we think that Kerberos is on its way out. After all, Microsoft have been seen as the principal torch bearer. What is clear in Server 2003 is that Microsoft . . .
Security is a major part of the foundation of any system that is not totally cut off from other machines and users. Some aspects of security have a place even on isolated machines. Examples are periodic system backups, BIOS or power-on passwords, and self-locking screensavers. . . .
Moore's law is the biggest threat to privacy today, asserts Phil Zimmermann, who in the early 1990s developed Pretty Good Privacy to bring encryption to the masses. Zimmermann, who was here for the Infosecurity conference, told ZDNet UK that Moore's law represents a "blind force" that is fueling an undirected technology escalation.. . .
[They] deployed a VPN based on the IPsec protocol. That provided session encryption and authentication and enabled network-level access to resources, but it also proved problematic. "Some physicians still use our VPN, but there are real support issues. You need to configure software on each client. What we wanted was an application-level gateway of some sort,". . .
As the wave of acquisitions in the security industry continues to mold innovation and original thought into a gray mass of sameness and me-too product offerings, successful, independent security companies are fast becoming a dying breed. One of the few holdouts . . .
Just three weeks before Microsoft Corp. publicly details plans to create a secure operating mode for Windows PCs, two top cryptographers have raised concerns about Microsoft's approach. . .
Ever looked at the Mona Lisa and wondered why he's got such a goofy grin? Yes, we do mean he. Evidently, Mona isn't quite the woman art historians thought she was. But only those who know the secret code . . .
Cheating on income taxes or neglecting to pay sales taxes on online purchases could get you five extra years in prison if the government succeeds in restricting data-scrambling technology, encryption-rights advocates fear.. . .
This is the second article in a two-part series looking at cryptographic filesystems. The first article in this series covered the background on cryptographic filesystems from the underlying concepts to some of the mechanics of those systems. This article will cover . . .
I can imagine a world where the computers needed no security. Where there were no passwords, no security checks, and no firewalls. Where the computers communicated freely and shared information rather than hiding it. I can also imagine the scoundrels of . . .
Over the past couple of years, steganography has been the source of a lot of discussion, particularly as it was suspected that terrorists connected with the September 11 attacks might have used it for covert communications. While no such connection has . . .
Cheating on income taxes or neglecting to pay sales taxes on online shopping could get you five extra years in prison if the government succeeds in restricting data-scrambling technology, encryption-rights advocates fear. . .
OpenSSH 3.6 has just been released. It will be available from the mirrors listed at OpenSSH shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. . .
Cheating on income taxes or neglecting to pay sales taxes on online shopping could get you five extra years in prison if the government succeeds in restricting data-scrambling technology, encryption-rights advocates fear. . .
In contrast to the cooperative preparations required for setting up private key encryption, such as secret-sharing and close coordination between sender and receiver, you can act entirely on your own to create and publish two numbers that enable anyone, using the . . .
There is nothing like the fear of weapons of mass destruction to bring out weary old legislative proposals. Earlier this month, it leaked out that the Justice Department was considering a broad expansion of its investigative authority, including the creation of . . .
The High Court in London has imposed an injunction on Cambridge University security experts who claim to have uncovered serious failings in the system banks use to secure ATM PIN codes. . . .
Netizens with extreme privacy needs got a new tool for their cyber utility belts recently with the release of an application that lets users hide secret messages in virtually any executable computer program, without changing the program's size or affecting its . . .