-
Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...
Last updated: -
Can ECC be an alternative to RSA algorithm?
ECC is much stronger algorithm than RSA, but still RSA is widely used public key algorithm. What are the issues that are in front of ECC to become commercialized?
Last updated: -
Open IT Forum: What IT conferences are you attending this year?
Below is a list of the conferences IT Knowledge Exchange is planning on attending in 2011. If you or your company is planning on attending any of them, we'd love to see you there. Let us know if our schedules match up, or tell us which conferences you are going to. RSA Conference, February...
Last updated: -
Shouldn’t a person just RSA-encrypt the entire document?
After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...
Last updated: -
RSA: Doing a dictionary attack
In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...
Last updated: -
What should the process be to remove users on leave?
Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?
Last updated: -
RSA and DSA keys: Which one should I choose?
I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?
-
Cache-based side channel attacks
Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...
Last updated: -
RSA Adaptive Authentication and PCI DSS 8.3
I have a client that's concerned that RSA's Adaptive Authentication no longer satisfies 8.3, two-factor authentication when the user is mobile, and not using his registered device. RSA's step-up question authentication and remote user enrollment appears to not be in conformance.
Last updated: -
Does Microsoft 2008 Terminal Services support 2 level authentication?
Does Microsoft 2008 Terminal Services support 2 level authentication with things like smart cards or RSA Tokens? This question is from the Microsoft Virtualization Chat on ITKnowledgeExchange.com
Last updated: -
Sharepint 2007 with RSA secureId authentication
We are implementing sharepoint 2007 and we have a problem because RSA does not support moss 2007. Please! there is any way or work around about this issue?best regards diego.maira@gmail.com
Last updated: