Linux Cryptography - Page 38
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
If you want to keep private your personal files, such as those containing phone numbers, correspondence or journals, you could keep them in a hidden directory named ~/.private with mode 0700, so only you could read the files. Are you chuckling . . .
OpenSSH 3.5 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement.. . .
"Robust and commercially available encryption products are proliferating, and no legal means has been provided to law enforcement to deal with this problem, as was recently done by Parliament in the United Kingdom," Freeh said in his testimony. "Terrorists, drug traffickers and criminals have been able to exploit this huge vulnerability in our public safety matrix.". . .
This issue, we have reports of FreeS/WAN running on the Sharp Zaurus (item 1) and having a few small issues with RedHat 8.0 (item 2). Claudia Schmeing has posted a new revision of our interoperation document (item 3). Item 4 has a great discussion on the use of routing protocols with FreeS/WAN.. . .
Hackers start using 'side-channel' attacks Side-channel attacks are the next big threat from hackers, according to the head of RSA Labs. Normal attacks on code are conducted by looking at the unencrypted message and the encrypted message and attempt to . . .
In his keynote address at the Fall 2002 Intel Developer Forum, Otellini said that beginning in 2003, Intel processors would feature new technology that would better safeguard data from hackers and viruses. . .
The Web's leading standards group proposed two recommendations for encrypting XML data and documents, a key development in the organization's push to standardize technologies crucial to Web services. . .
Shine a flashlight through a shattered window and you'll project a unique pattern onto any surface beyond the window. Move the flashlight to a new angle and you'll get another unique pattern, but one that looks more like the first than . . .
UK researchers have managed to send untamperable encryption keys over long distances, opening the way for totally secure communications. A team of scientists said on Wednesday they had made a major leap toward developing secure global communications. . .
These are busy days at InfoGard Labs. The San Luis Obispo (Calif.) outfit is one of only six info-tech laboratories in the U.S. and Canada allowed to issue a government seal of approval known as FIPS compliance. FIPS stands for Federal . . .
Too many organizations have critical data sitting on unsecured enterprise networks. Shrinking budgets and persistent calls to streamline internal operations are creating a glut of exposed enterprise networks. At the same time, more business executives are becoming IT security conscious, . . .
RSA Laboratories, the research center of RSA Security Inc. (Nasdaq: RSAS), the most trusted name in e-security®, today announced that a coordinated team of computer programmers and enthusiasts, known as distributed.net, has solved the RC5-64 Secret-Key Challenge. The distributed.net team solved the challenge in approximately four years, using 331,252 volunteers and their machines. Distributed.net receives a cash prize of $10,000 for solving the challenge.. . .
DesktopLinux.com guest author David Scribner has penned an article introducing new users to GnuPG on GNU/Linux (and UNIX) systems. Scribner focuses on how this powerful encryption package can play a vital role in personal and business communications by increasing security. This very detailed article will be available in two parts this week on DesktopLinux.com.. . .
When you send your credit card number over the Internet to pay for a new book or a pair of pants, the number is mathematically disguised -- encrypted -- so that the original string of digits can be decoded only by . . .
Sun's "elliptic curve" technology is involved in the process of using keys to encrypt and decrypt information for electronic transactions. Such encryption lets people buy products online, for example, while shielding their credit card number from prying eyes. The Santa Clara, . . .
In 1995, Paul Kocher caught the attention of information-security experts when he unveiled a method for cracking a handful of commonly used computer codes by timing how long it took for computers to process requests using those code algorithims. Today, Kocher . . .
In a lush country hotel 20 miles south of Dublin, the barroom conversation turns to steganography and database vulnerabilities, encryption algorithms and biometric scanners, SWAP files and cookie poisoning. Not your average pub denizens, the speakers are some of the . . .
Francisco Perez lets us know of support for the HiFn crypto board. "The driver provides crypto acceleration for FreeSwan IPSEC application and others. Security Data is an I.T Security services & OEM producer of Security Equipment based on Linux OS.. . .
Theoretical attacks against AES (Advanced Encryption Standard) winner Rijndael and runner-up Serpent have been published. They might work in the practical world; they might not. That's about all we can say from the latest edition of Bruce Schneier's CryptoGram newsletter, which . . .
Encapsulating security payloads, key exchange mechanisms and other components of establishing secure data transfers. In Part 2, we move on to encapsulating security payloads and key exchange mechanisms. IPSec ESP format, specified in RFC 2406, provides confidentiality, authenticity and integrity.. . .