• MDE unresponsive when booting Dell 3040

    When booting Dell 3040's encrypted with MDE and using HDMI to DVI and HDMI connected dual monitors, the mouse will be unresponsive in 5 seconds from seeing the MDE authentication screen. Have updated the BIOS. Has anyone seen this happen and is there a resolution? Thank you for your help!

    mmonnin15 pointsBadges:
  • How to encrypt an .exe file into a .Jpeg file?

    Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that? Are there any threats to...

    Kalyan20088745 pointsBadges:
  • Open Source Key Management Server

    I'm looking for recommendations/reviews on an Open Source Key Management Server platform to handle storage array Data At Rest Encryption (DARE). If no open source recommendations are available, what is the consensus on COTS products?

    jimmygove5 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE1,047,445 pointsBadges:
  • How encrypted is a set of data

    Hi, Is there a way to know how strongly encrypted a set of data is? Is there any tool to identify secure encryption?

    kavitha6325 pointsBadges:
  • What is Advanced Encryption Standard?

    What does AES (Advanced Encryption Standard) mean?

    RabanoWRiter5 pointsBadges:
  • Host data in blockchain without compromising data confidentiality

    We have a certificate verification system where certificates are verified via Encrypted QR codes and NFC Tags. Can we host this data in Blockchain (Open Source/decentralized databases) without compromising Student data confidentiality but enjoying the extra security of cryptographic encryption of...

    Mhazi105 pointsBadges:
  • Security measures for WhatsApp video call

    Can a WhatsApp video call be hacked by a third person or third party? Does WhatsApp even have end-to-end encryption.

    Jeans8035 pointsBadges:
  • Strongest encryption type for WLAN

    For WLAN, what is the strongest encryption type?

    gladystina10 pointsBadges:
  • Encrypt dual booting laptop

    Hi experts, I have an encryption question for you. My laptop is dual booting more than one OS. How can I encrypt it? I can't use BitLocker since that only works on Windows. Is this not possible? Do I have to encrypt Windows and Linux separately?

    ITKE1,047,445 pointsBadges:
  • How to decrypt a SHA1 hash value?

    SHA= 2fd4e1c6 7a2d28fc ed849ee1 bb76e739 1b93eb12. How can I decrypt (to ASCII) the string using RPG/400? What is its coding scheme?

    rajat01130 pointsBadges:
  • What type of medical data requires encryption?

    I want to know an example of medical data collected through sensors which require encryption.

    revaneshm01515 pointsBadges:
  • Advantages of 3DES standard

    What are the advantages of the 3DES standard?

    sarankumar5 pointsBadges:
  • How to implement AES encryption on ARM7?

    I have an embedded device based on FreeRTOS. It has LPC2387 ARM7 MCU. My Apache Tomcat server has been written in Java. I want to implement AES encryption on the string of data sent from the device to the server.

    arvimg5 pointsBadges:
  • Why does the cloud still use AES or Blowfish encryption techniques?

    If homomorphic encryption is too good, why does the cloud still use AES or Blowfish encryption techniques?

    Ishu1235 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • What is key roll?

    How can I determine in the packets the key roll?

    dinessa5 pointsBadges:
  • Decrypt UFD2 hash

    It is a Facebook password and it might be on Croatian this is the UFD2 hash: e72402b130c69e67546c5eabc73cf2d0. What should I do?

    idafidelia5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following