Tags » Encryption

Password History Analysis

When cracking Active Directory passwords as I explained in this series of blog posts, you can also crack the password history.

The program I’m releasing now will make a report of users who “recycle” their previous passwords by using a common string. 559 more words

My Software

Encryption in transit

What’s the story today?

I have been tasked with coming up with the implementation for “in transit” data encryption of all the communication flowing back and forth from the web servers to the database servers. 3,577 more words

Simple Tricks And How To's

The new General Data Protection Regulation is coming. #GDPR

General Data Protection Regulations (GDPR)

  • 20% of UK IT decision makers are unaware of GDPR
  • 26% of companies don’t know how long they have to become compliant…
  • 778 more words

Multiformats LogoMultiformats / Multihash - from MIT

Multihash is a protocol for differentiating outputs from various well-established hash functions, addressing size + encoding considerations. It is useful to write applications that future-proof their use of hashes, and allow multiple hash functions to coexist. 1,605 more words

[Network Administration] : Ubuntu and encrypted swap space

Installing Ubuntu 14.04LTS, I’ve gotten the following error:
the disk drive for /dev/mapper/cryptswap1 is not ready yet or not present
The message is annoying, but worse, the swap partition is not encrypted. 86 more words


For the Encryption Illiterate: A Brief, Up-to-Date Review of Human Rights and Encryption

It cannot be ignored, privacy rights. Within the realm of internet governance, there is no more debated topic than encryption. Encryption is defined by UNESCO as “the protection of personal data against unlawful access by other-than-intended recipients”(UNESCO, 2016, p. 569 more words