Tags » Encrypt

Encrypt your critical documents and share them securely

Here is a database that enables you to store and share a critical document containing confidential information in a secure way on your computer.  The view shown here illustrates a list of records that the user sees on entering the secure database. 115 more words


The Intercept | The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle | Full Story

AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. 5,484 more words

Edward Snowden

Encrypt Stored Procedure & UDF

To encrypt a user-defined function or Stored procedure, simply add WITH ENCRYPTION to the CREATE FUNCTION or CREATE PROCEDURE statments.


CREATE FUNCTION dbo.getHash ( @inputString VARCHAR(20) ) 25 more words

Connecticut bill requires insurers to encrypt personal data

HARTFORD, Conn. (AP) — Insurance companies operating in Connecticut would be required to encrypt all personal information records they store under a bill that’s being offered by Senate Democrats. 120 more words


Fiddler – The missing string of Web Development (Decrypting HTTPS) – Part III

Configure Fiddler to Decrypt HTTPS Traffic

Sometimes websites depend on resources both from HTTP and HTTPS.

Example – Many websites where speed is a concern, they operate often over HTTP instead of HTTPS. 284 more words


Caesar's Cipher

Cryptography has existed even before there were computers.  One of the oldest ways of hiding information was used by Julius Caesar. In his cipher, each character in the original plaintext was shifted to 3 positions to right in order to hide what is exactly being said in the text. 67 more words