Security Tag Directory

Featured Security Questions

  • How to encrypt an .exe file into a .Jpeg file?

    Hello guys. I have a question. I want to know how can we encrypt a .exe file into a .JPEG file? Its like, when we open the image file, the .exe file should run on its own. I know there are some complicated encryption methods but are there any simple methods? Can we do that? Are there any threats to...

    Kalyan20088745 pointsBadges:
  • Gmail: Encrypt emails with GPG

    I'm using Gmail and I need to make my emails encrypted (particularly with GPG). How can I do this? Is there a tool I should use?

    ITKE380,220 pointsBadges:
  • How do I encrypt my Gmail?

    I would like to Send a message to other party, but what I am concern about that my message might leak or something like that. So my question is, how do I encrypt my Gmail? Many thanks.

    Ghazwa5 pointsBadges:
  • Is there any possibility to combine any two of the encryption algorithms?

    Can we combine two algorithms to make the encryption works much better?

    MANPREET9115 pointsBadges:
  • Could an encrypted random sequence be attacked?

    If we encrypt a random sequence, could it be attacked (does crypt-analysis depend on that the message has a specific meaning? )

    alimannaa25 pointsBadges:
  • HTTPS headers encrypted

    I'm sending data over HTTPS and my content is encrypted but I'm not sure if my headers are encrypted. Are they? Thank you.

    ITKE380,220 pointsBadges:
  • Why does the cloud still use AES or Blowfish encryption techniques?

    If homomorphic encryption is too good, why does the cloud still use AES or Blowfish encryption techniques?

    Ishu1235 pointsBadges:
  • Rotate keys in SQL Server encryption for PCI compliance

    I understand that PCI compliance needs an annual rotation of keys. It's for decrypting your data, followed by re-encrypting it with a new key. So we have around 16 databases that are across 3 servers and multiple tables. It's only going to get bigger. Could I write something for this? Or should I...

    ITKE380,220 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • PCI compliance: Recommended encryption key management

    This question is in reference to PCI compliance. Does anyone know of any recommended encryption key management software? Would ezNCrypt be good to use? Thanks so much.

    ITKE380,220 pointsBadges:
  • Security on Client Access

    Can you please advise if there is any level on encryption on Client Access data transfer without adding SSL functionality?

    JZYoung5 pointsBadges:
  • Is PGP encryption available for IBM I

    Is PGP command line encryption of files available for IBM I?

    arfarn105 pointsBadges:
  • How to prevent users from using EFS encryption in Windows Server 2003?

    I have two related question regarding Windows Server 2003: 1- How do I prevent users from using EFS encryption? 2- If a file, or a folder, is already encrypted using EFS by a user and the file permissions have been changed to prevent admin from deleting this file, how can the admin recover the...

    WindowsServerATE335 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • How to do rest encryption with a SAN?

    Our organization needs to make sure that our rest encryption is done in one place. If there's shared storage, that seems to be the right place to do it for us, rather than a DAS. We need to cover the case of drives being recovered without keys / keys be required when the SAN boots. How should we go...

    ITKE380,220 pointsBadges:
  • Storing the encryption/decryption key for SQL Server in a safe location

    I've got a DB in which i need to store the encrypted values for a column. I use the SQL Server encryption format for encryption. The format is as follows: CREATE MASTER KEY ENCRYPTION BY PASSWORD 'dsagfdsagv418515adsf' CREATE CERTIFICATE 'CERTIFICATE_NAME' CREATE SYMMETRIC KEY 'KEY_NAME' WITH...

    conqueredplanet5 pointsBadges:
  • Should we go ahead with encrypted backups?

    I'm in charge of our department's laptops and now I need to get some sort of automated remote backups started. They would be going to a RAID drive. But the thing is that we don't have a secure vault to hold all of the drives. After talking to my boss, we thought about using some encryption process....

    ITKE380,220 pointsBadges:
  • Can Dongle not store any data?

    We're in a restricted office space and if the data storage devices are restricted to be carried at work, can dongle be allowed? Can a dongle not store any data?

    RuchiSabherwal5 pointsBadges:
  • Need Storage encrypted solution

    Hi, I hope you can give me an option to have encrypted data at storage level, preferable SAN but if not possible NAS can be adopted. Must be 256 bit encrypted, this is required for call recording compliance. Thanks in advance.

    Xtornet5 pointsBadges:
  • Add domain admins to remote desktop user group

    How to add domain admins to remote desktop user group using command line?

    dinesh1435 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following