Security Corner:

Encryption


April 16, 2010  2:56 PM

Software for Secure Computing: dsCrypt



Posted by: Ken Harthun
Encryption, Secure Computing, Software for Secure Computing

I found this nifty little encryption utility on Gizmo's Freeware Reviews site and immediately fell in love with it. It's lightweight (25K), fast and easy to use. Double click the single executable and a small box appears (see below)....

February 20, 2010  4:00 PM

Software for Secure Computing: LockNote



Posted by: Ken Harthun
Encryption, Security, Software for Secure Computing

Steganos GmbH (Germany) provides LockNote for free so you can encrypt sensitive information in text files. LockNote is open source and is based upon open source technologies, e.g. the certified CryptoPP program library for strong encryption. The...


December 8, 2009  8:53 PM

Golden Rule #10: Store Your Backups Securely



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Encryption, Security, Security practice

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 19, 2009  11:34 PM

Trust Only https:// on Form Pages



Posted by: Ken Harthun
Encryption, Secure Computing, Security, SSL

How often, when you log into a site that requires a username and password, to you check to see if the connection is secure? You probably don't give it a second thought. Most people don't. For many sites, like newspapers, online magazines, etc., it probably doesn't matter much. Who cares if someone...


October 17, 2009  12:23 AM

Free Encryption Tool for the Absentminded



Posted by: Ken Harthun
Encryption, Security, Security tools

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 26, 2009  2:46 AM

Protect HTML Code for Increased Security



Posted by: Ken Harthun
Encryption, secure coding, Security

If the challenges at Hackthissite.org illustrate one thing, it's that viewing the source code of web pages can often reveal exploitable vulnerabilities. Beyond that, eCommerce sites often have payment buttons, shopping carts and other means to facilitate transactions. If the code for these things...


June 24, 2009  5:45 PM

FAA Gives PKWare’s SecureZip Stamp of Approval



Posted by: Ken Harthun
Encryption, InfoSec, Secure Computing, Security

It doesn't surprise me that the inventor of the ZIP file format was recently awarded a large enterprise software license and maintenance agreement from the Federal Aviation Administration (FAA). What does surprise me is that with my network of security news sources, I hadn't heard about this...


June 18, 2009  9:29 PM

How to Use the Windows Registry for Cyber Forensics: Part 2



Posted by: Ken Harthun
Cyber Forensics, Cybercrime, Encryption, Hacking, Intrusion detection

In Part 1 of this series, I introduced you to the concept of date/time coincidence and we explored five registry keys that are useful to the forensic examiner. This time, I'll show you how data can be encrypted and hidden in the registry. If you're involved in data security, you're familiar with...


March 24, 2009  6:47 PM

Pagefile.sys is a Security Risk



Posted by: Ken Harthun
Encryption, Memory, Secure Computing, Security, Security management

Since the early days of Windows (3.x and forward), the operating system has relied upon vritual memory in the form of files stored on the hard drive to compensate for the lack of a machine's physical memory. When the machine's physical memory begins filling up, pages of data are...


March 20, 2009  1:35 AM

Another Little Known Tool to Securely Delete Files, Folders, and Volumes



Posted by: Ken Harthun
Cryptography, Data destruction, Data sanitization, Encryption, Opinion, Secure drive wipe, Security, Security management

Why, all of a sudden, is everyone concerned about secure file deletion? I hesitate to say it’s a sign of the poor economy, but perhaps people consider it even more important to protect their personal information when the idea of losing control of their assets—and their...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: