1,159 Topics
![]() | |
Is it good news from Sun Microsystems, if you are in the market for a generic communication protocol between a key manager and an encrypting device? Sun has announced what it claims to be the [URL="http://opensolaris.org/os/project/kmsagenttoolkit/"]release[/URL] of the first such protocol into an open source community as part of the … | |
How many passwords do you have to remember? The common answer is either too many and I sometimes forget them, or alternatively just the one as I use it for everything. Both options are bad in terms of security. Which is where password management systems come in, and these can … | |
Hey, now that is pretty cool! Hot on the heels of a [URL="http://www.itwire.com/content/view/21585/53/"]report[/URL] suggesting that some 280 million people around the world have suffered some kind of data loss (through theft or incompetence mainly) during the last three years, Dell just might have the answer. It would appear to be … | |
According to Russian forensic security experts and 'password recovery' specialists ElcomSoft, the days of protecting documents and files with 40-bit encryption are now officially over. It has now released a product which uses Thunder Tables technology to unlock password-protected documents that have been created using Microsoft Word. In fact, it … | |
Effective Wednesday, October 1, each business in Nevada must encrypt customers’ personal information when it is transmitted outside the business’ secure network, such as when it's transmitted over wifi. Initially passed in October 2007, it was said to have been the [URL="http://www.privsecblog.com/archives/state-legislation-some-state-data-encryption-requirements-more-effective-than-others.html"]first law[/URL] of this type. The Commonwealth of Massachusetts … | |
[URL="http://www.theinquirer.net/gb/inquirer/news/2008/07/04/hundreds-thousands-laptops-left"]According to The Inquirer[/URL] a new report by the Ponemon Institute, rather appropriately sponsored by Dell, has revealed that an astonishing number of laptops are lost at airports across the United States on a weekly basis. Asking questions of 800 business travellers at some 106 major airports in the US, … | |
[URL="ttp://www.kaspersky.com"]Kaspersky Lab[/URL] is warning the public at large to be on the lookout for a new version of the blackmail virus Gpcode which has started to appear in the wild. This particularly nasty twist on the virus format encrypts your files using an RSA encryption algorithm, this time with a … | |
When [URL="http://www.techdirt.com/articles/20080222/105312322.shtml"]Bill Gates gave a speech[/URL] last winter and hinted that the need for a keyboard was going to be diminishing, the writer in me scoffed, but I should learn to take Bill’s little hints a bit more seriously because the next version of Windows (aka Windows 7) is going … | |
An employee of the Northern Trust Bank in Naples, California apparently stole a number of bank owned computers which he then either sold to his co-workers, pawned or auctioned off on eBay. The 34 year old man pleaded to a felony fraud charge and sentencing has been deferred until it … | |
The Cult of the Dead Cow, the infamous hacking collective, has released a Google hacking utility called Goolag Scan that brings the ability to search the information engine for web-based data that is normally hidden to anyone wannabe with a web browser and half a brain. It does this by … | |
For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, … | |
[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It … | |
If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question … | |
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … | |
Although there has been no great fuss made, no pin badges sold and no banners waved, Monday 4th February is for all intents and purposes the day IPv6 grows up. Because from that day, IPv6 IP addresses will be able to be directly translated into domain names and vice versa, … | |
Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is … | |
Nick Breese is a researcher with New Zealand based security outfit [URL="http://security-assessment.com/"]Security-Assessment.com[/URL] and found himself giving a presentation at the Kiwicon hacker conference in Wellington earlier this week. His presentation looked at the use of the PlayStation 3 games console to crack passwords, and Breese concluded that when compared to … | |
Forty three British MPs have backed a House of Commons motion calling for the [URL="http://www.duchyofcornwall.org/"]Duchy of Cornwall[/URL] estate, owned by Prince Charles, to make its accounts more transparent and the finances of the Prince of Wales clearer. Which is just what might happen following the disclosure that a laptop belonging … | |
[URL="http://www.hitachi.com"]Hitachi Global Storage Technologies[/URL] has announced the world’s highest-capacity, highest-performing notebook hard drive and it will feature in Dell and Alienware systems. The 2.5”, 200Gb, 7200rpm, Travelstar 7K200 brings twice the capacity of its predecessor as well as a 22 percent performance hike. Using Hitachi’s third-generation perpendicular magnetic recording technology, … | |
GPS satellite navigation devices have become an indispensable part of everyday life for millions of drivers the world over. Without these little technological route planning miracles, many of us would literally crash and burn as we struggled to regain control over that map while driving too fast and drinking a … | |
I invented an encryption algorhythm today and used it to "hide" the information in an unused password I came up with. This was done on paper, not with a program. However, I am planning to start laying some code down for this today (in Haskell, partly as an exercise to … | |
[URL="http://www.websense.com"]WebSense [/URL] security experts have published their predictions regarding the security threats that we will face in the new year, and perhaps unsurprisingly they revolve around the changing and dynamic nature of the Internet. “Organized criminals are realizing that the Internet has been a largely untapped resource in terms of … | |
On Thursday I went to Oxfordshire for a training day on the much anticipated Windows Vista. Firstly the appearance of Windows Vista has many improvements and enhancements over XP, with the outstanding graphics and of course Windows Aero, you've found what Microsoft like to call `the Vista experience`. The sku's: … | |
[URL="http://www.pgp.com"]PGP Corporation [/URL] will announce on Wednesday the availability of numerous application upgrades across its entire portfolio. I have persuaded them to let me break the embargo and bring the news to DaniWeb members a couple of days early. With global organizations increasingly facing highly publicized data breaches, regulatory pressures, … | |
With all the disscussion about classical computing issues on Daniweb, I thought it was time for an explanation of quantum computing. As I'm sure most of you are aware, a conventional CPU performs operations by switching transistors on and off in order to manipulate values stored on registers. The registors … | |
Although the Firefox Version 2.0 Beta is not actually released until Tuesday 11th, you can download the feature complete Windows public release candidate 1 build right now from the [URL="http://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/bonecho-beta1-candidates/rc1/firefox-2.0b1.en-US.win32.installer.exe"]Mozilla FTP server[/URL]. Linux and Mac versions are also available, early reports suggesting that it works just fine with Intel based … | |
Here’s a question for you: being a clued up Internet user which browser client do you favour when it comes to being totally safe and secure on the web? The answer I know you are shouting loudly at the screen is ‘Firefox you freakin’ idiot’. But at the risk of … | |
Happy Birthday to Firefox! Mozilla.org today confirmed that November 9, 2004 was when it's popular web browser Firefox, was released at version 1.0 Today, the software is at revision level 1.0.7 (Mac, Windows, Linux), and the company is working on 1.5. The announcement website: [url]http://www.mozilla.org/press/mozilla-2005-11-9.html[/url] mentions a contest to "extend" … | |
Security researchers announced a new vulnerability for users of the Firefox 1.0.6 browsers on a Unix or Linux platform. The problem revolves around a security bug that could allow hackers to execute arbitrary shell commands if they can trick the user into accepting a malicious link on a website. The … | |
The Mozilla Foundation ([url]www.mozilla.org[/url]) has announced that Firefox 1.5 Beta 1 is due on September 8. Firefox is an alternative web browser to IE developed by the Mozilla foundation, the group of people who brought us Netscape and other fine utilities. Firefox is available for Windows, Macintosh (both OS 9 … | |
I never realized how much publicity a handful of software developers could create with the release of one application. But they sure have made waves. [url=http://www.spreadfirefox.com]SpreadFirefox.com[/url], the Mozilla Foundation’s official promotion site for its Firefox web browser, reported today that over 80 million downloads have been made of the browser. … | |
According to Information Week (July 25, 2005), Firefox is facing a release delay. The article mentions that the Mozilla foundation has delayed the release of the next major version of Firefox until September. The current version of Firefox is 1.0.6 Firefox is a major alternative to Internet Explorer, the default … | |
From part of a cryptanalysis tool I was writing, the other day. A way of obtaining possible XOR'ed string values. If you ever get to the point in the analysis that you can simply XOR the string to get closer towards your goal, of finding a weakness, this might be … | |
Encryption has many issues. It can be very simple or very complex. I personally don’t have that many secrets, but when the company I worked for wanted to encrypt something I used the following : XOR ! What is nice about xor is that you can use the same method … | |
This snippet is an example of using XOR encryption to encrypt/decrypt a file. It uses command-line input parameters as follows:[indent]argv[1] - name of input file to encrypt/decrypt argv[2] - name of output file argv[3] - crypt key[/indent]For example, an input file called "main.c" is used to create an output file … | |
Anybody knows how to program a solution to hill cipher, its an encryption and decryption..I'm using 2x2 matrix to decrypt any word, can somebody give me some tips, suggestions or anything that could help me finish my job. Thank you very much! | |
I have this encryption program that I spend a lot of time writing I am a beginner but I consider it a nice program except that is is way to slow, can you see anyway to speed this up? Thanks. I know you don't like doing stuff for us but … | |
I have this encryption program that I spend hours on. I thought I had it all worked out but no. What could be my problem can anyone help me. You can ignor the void doSet() I will ad that later. Thanks. | |
Hi guys i have recently begun exploring encryption and came across XOR though i have attempted to understand it and implement it in reading files and then encrypting it but i cannot understand the decryption process of it at all and keep getting confused [code]srand(time(NULL)); for(index=0;index<MAX;index++) { Matrix[index]=rand()%63000000; KeyFile1<<Matrix[index]<<endl; } … | |
When a host request a page from server, the server will 1st bind a encryption key to the host's mac address. Data provided by host will be encrypted at the client side using the same encryption key. The encrypted data submitted by the host will be decrypt by the server. … | |
I appologize for the length of this post, but I have no clue what is wrong with my program. As an experiment, I wrote a XOR encryption program. It isnt very fast, but it works. Apparently, only for strings. I implemented a file encryption function, and it seems that some … | |
Hi, I need a help to find out solution to these problems (1) Write a program that will ask the user to input a hexadecimal number and display the number of binary one’s within that number. (2) Write a program that will ask the user to input his name. Then … | |
input qty while qty > 0 input size call Calculate Scrap using 10 to get scrap 10, qty needed for 10 call Calculate Scrap using 25 to get scrap 25, qty needed for 25 call Calculate Scrap using 40 to get scrap 40, qty needed for 40 if scrap 10 … | |
Greeting everyone.. This is my very first thread. I'm a final year student doing my thesis. I want to develop a software of Java that can encrypt an image so that it can be transformed to unreadable form. My idea is to transform the image file (i.e JPG, BMP) to … | |
Hello everyone, I am trying to write a program that gives you 3 options: 1 for encryption 2 for decryption 3 Exits the program If option 1, my program will ask for a password, an input file name and an output file name. My program will then read the file … | |
Hi all C# experts out there, I'm currently working on a school project. When i use the Decrypt method from the Rijndael algorithm, i would run into a "invalid padding" error when decrypting. What should i do? [code=csharp] public byte[] Decrypt(byte[] cipherTextBytes) { // Convert strings defining encryption key characteristics … | |
hi.. I was working with the file /etc/sysconfig/network-script/ifcfg-eth0; edited that and to save those editings on the file i as usual press key x to write and exit. but my capslock was on, so i actually pressed X then a prompt came : enter encryption key: i entered 6 characters … | |
Hey all I'm looking for a nice simple password encryption algorithm. I'm not looking for anything amazingly military type secure, but If I could do something irreversible, I'd be happy. I've looked at a couple of google searches, but found nothing particularly interesting. Any help would be greatly appreciated. Thanks … | |
hi guys, i need to encrypt a plain text limited to 15 characters but the output the encryption must also be 15 characters since i am limited to database constraint. how can i do this? thanks | |
Hi there. I have an encryption method which handles a string char by char and converts it to base 32, then adds it onto the result string. However, it seems to completely replace the result string instead of adding onto the end of it. My code: [code] char *encrypt(std::string input, … |
The End.