I'm looking for best practices for using our iPhones and iPads on public Wi-Fi networks. That is, what can we do to best protect/secure/encrypt the data that is transmitted over such networks to/from the devices (aside from not using the public networks in the first place)? Would using a VPN accomplish this? Any recommendations for one? Something else? These are iPhone 7's and iPad Pro's, all running the latest version of iOS 10. Thank you!
It's the second half of 2016, and I still can't choose between 1Password, LastPass, and Dashlane. What password manager should I be using? [more inside]
I know there are a lot of good programs that will allow you to encrypt part or even all of the files/folders on a portable HDD. I am looking for a simple way to password protect the whole HDD so that if it is attached to any computer, a password is needed to access it. I know that is not as 'good' as encryption', but that is all I need. TIA.
What can I do to make my iPhone more secure? Difficulty level: 1984. [more inside]
I have a bunch of files in a cloud account that I have, at some point, encrypted before uploading them, but now I can't remember what I used to encrypt them. However the file (re-)naming system looks like other people might recognise what software I used... [more inside]
Is there a corporate grade storage device (NAS/SAN) that comes with functionality to prevent all data from being deleted and the only way to access the data is to export it and wrap it with a mandatory password security? More details inside [more inside]
So my go to encryption product used to be truecrypt but Drama! So what is the go to, cross platform agnostic, encryption program that can mount encrypted containers as a drive letter? [more inside]
I use Macs. I use a flash drive to carry powerpoint presentations and other documents that I need to access on PC's running various flavours of Windows, which are not mine and I will not have administrator access to. Is there a way that I can protect/encrypt the drive in a way that will let me use it on both systems, without having to pre-install software on the Windows system? I do not need government-grade encryption, just something that will stop casual snoopers accessing the data if I lose the drive.
TaxFilter time! I am out-of-town and to facilitate getting my taxes done, my accountant sent me a copy of the draft and final returns via unencrypted email. Is this a standard practice these days? [more inside]
What is the simplest and most effective way to protect data on a laptop - simple enough for a not tech-savvy lady in her 60s? [more inside]
I used to use Truecrypt to encrypt little enclosures so I wouldn't have to worry about my files so much when I, say, put them on a USB stick or backed them up to the cloud. There was a whole... thing with Truecrypt and now it's hard to say if I should use it anymore. Is there another program that's going to work well for this purpose? [more inside]
I have just discovered that I have two public PGP keys from 1996 and 1997. I recovered the private keys, but I've forgotten the passphrase. Can this be defeated? [more inside]
Recently I noticed a lot of controversy about whether Truecrypt is secure or not. It looks like their webpage is raising concerns about it, even to the point of suggesting that people migrate their data away from it. Arstechnica and others are following the story. What's going on? Might this be a hoax? Are truecrypt encrypted flashdrives not safe? If not, what level of security do they provide, if any? What would be a good alternative if we are to migrate away as quickly as possible?
At work, I can digitally sign and encrypt emails using digital certificates on my ID (and a card reader attached to my laptop). It integrates decently with Outlook and Acrobat. It's 2014. What are my PKI options for personal use? [more inside]
I've only worked in a small business (15-20 employees) since I got out of school, and I've handled the technological necessities since I started because nobody else could. I've handled things on an as-needed basis: troubleshooting problems, setting up new computers, maintaining an iron grip on software installations, setting up the network and administering simple network devices, etc. However, I'm completely self-taught, and I have no idea if my hacked-together system looks anything like a properly-implemented corporate IT system. So I want to know what one looks like. Specifically, I'd like to know if there are any resources I can check out on my own that paint the picture of what I should be trying to achieve. NOTE: I'm NOT averse to hiring an outside IT firm or consultant to help with specification and implementation. However, I don't want to be at the mercy of a firm's "knowledge" and my own ignorance; you can waste a lot of money that way, regardless of scenario. [more inside]
I want to back up some of my media files to various cloud storage sites (box, Dropbox, Google drive and skydrive.) I don't want them to easily see the file names or types. [more inside]
I have a portable drive w/an encrypted partition that I cannot get to mount on a laptop running Ubuntu 12.04. It is not visible to Disk Utility, either. Can anyone walk me through accessing its contents?
I know there are a variety of options out there, but I'm having a hard time sifting through the information myself. [more inside]
Is there any software that allows for encryption of home directories in OSX, a la original FileVault? [more inside]
Does anyone know of a method to remove encryption from DVD (movie) ISOs? I have OSX and Windows at my disposal, and can install any flavor of Linux if it will help solve my problem. [more inside]
Everywhere on the web there is discussion of B&N's great deal on the Nook HD+ for Father's Day. I took the bite and picked up the 16GB (comes w/micro sd port). So far, so good. My questions are: 1) Is there full tablet AES encryption for these? 2) Since B&N finally opened up the Nook and it's now compatible with Google Play's App Store, is there really a reason to root it? And a question about iMessage alternatives. (More inside) [more inside]
Is there a reliable disk encryption tool for Linux that is simpler for a nOOb to install than TrueCrypt? I've failed in getting TC to work, but have two older Western Digital MyBook drives that I'd like to protect. [more inside]
I'm an avid user of Gmail and other Google services, but I'm increasingly uncomfortable keeping my entire email history on someone else's servers. Can I keep a week's worth of messages on the server and encrypt everything else? What are some other Gmail privacy compromises? [more inside]
This envelope with a letter inside was found inside a large decaying bound edition of Shakespeare auf Deutsch in a junk shop in Bushwick that was only apparently open for a few months before disappearing. The letter, postmarked 15 March, 1939 - was sent to Paris by a Mr. Henri Wolf. The contents of the letter appear to be German shorthand. Included was small piece of what looks like code, there's nothing else on the back.The letter, envelope, postcard, etc in question are at this imgur album. Hivemind: What the hell is this?
The best and simplest way to communicate between a smallish number of (known) people, on a few different devices, with encryption? [more inside]
How can I electronically send confidential/private information to other people as conveniently but securely as possible? [more inside]
I have a program that stores information in a database. Because this program doesn't have an API, any automation has to be done by writing directly to the database. Some of the database columns are encoded, so in order to write into them I need to know the encoding method. Can you help me figure it out? Examples inside. [more inside]
I'm looking for a good Linux distribution to run from a USB stick for virus scanning on Windows computers. Difficulty - these computers have their hard drives encrypted with TrueCrypt. [more inside]
Help me understand how encryption works when there's just one device involved. [more inside]
I'd like to make certain documents at work (mostly PDFs) only openable to logged-in domain members based on group membership. Watermarking with account credentials would be a plus. [more inside]
When uploading my files to the cloud, are they automatically encrypted before they leave my computer?
When uploading my files to major cloud services (Microsoft SkyDrive, Google Docs and Google Picasaweb), are they automatically encrypted before they leave my computer? [more inside]
Looking for a community/forum where I can learn more about networking, code, security, and OS-independent CS topics
I'm looking for a forum where I can ask questions about networking, security, coding, operating systems, web design, etc. There are many of these out there, but I'd like to find a single community which covers all these topics more or less equally (so it isn't a Linux forum with a small section on BSD, or a coding forum with a small section on networking). I'd like it to be the sort of forum where users stay around for several years as they learn and contribute at different levels, with high literacy and education-to-spam levels. Could I have your recommendations please?
Espionage/Police Procedural Filter: how do the police, or CIA, or FBI, MI5, MI6, private eyes, or whoever do their job in a world of encryption, cloud storage, and teeny tiny little storage devices? [more inside]
After reading through lots of tips and tricks on backing up data on here, I am close to a backup system that really works for me. However, can anyone help me with two things: securing an offsite backup, and backing up a bootcamp partition? [more inside]
If I wanted banks or companies like LastPass to hire me to be on their security team to make systems safer and to block out hackers, what websites/books/resources should I dive into to go from n00b to pr0 ?? [more inside]
Need some guidance on message-digest based password generation algorithms. [more inside]
A number of technology experts have criticized the iPhone's implementation of in-built hardware encryption. Apparently, circumventing it is a trivial matter of docking it to an Ubuntu system and making a drive image. For someone who knows what he is doing, it would take only a few minutes. How secure, however, is the "Erase all Content and Settings" option? If I understand correctly, this works by simply wiping the encryption key thus rendering all data useless to an intruder. More inside. [more inside]
What are the easiest-to-administer alternatives to BitLocker for file or hard drive encryption on a Windows 7 laptop? [more inside]
How do I securely implement a cryptographic challenge-response in software if the software needs my AES key to create the challenge? [more inside]
I’m going to buy a laptop soon that may end up holding sensitive data. I need to make sure that, if it is stolen, it’s nearly impossible to get the data off the hard drive. I’m a newbie at dealing with workstation security and drive encryption, so please talk me through my options and best practices. I’m willing to pay more for a laptop designed for this purpose if that exists. [more inside]
Insurance data is unencrypted. Should this be reported? How? [more inside]
When people attach a "pgp signature key" to their e-mails, what does that do exactly? What is to keep me from copying their pgp key and forging e-mail headers? [more inside]
I'm tasked with attempting to build a secure virtual appliance. Problem is, I'm trying to stop people from gaining root access to the appliance via single user mode. This leads to a need for disk encryption, any ideas on how to create encrypted disk that wouldn't require someone to put in a password (plug in usb, interact with the boot process) to boot and still be relatively secure?
How can I view an old Microsoft Word document that is password protected, when I cannot remember the password? [more inside]
I have severe 1Password/Lastpass confusion. Does one supercede the other or are they meant to be used concurrently, in an ideal situation? I'm confused whether they perform the same function or not. Please help me organize my stuff! [more inside]
How are passwords stored in systems that require the user to enter specific digits of their password?
How are passwords stored in systems that require the user to enter specific digits of their password? I am familiar with encryption techniques such as MD5 hashes, but I can't see a way in which a system would store the entire encrypted password, and still be able to authenticate individual characters, unless the password is stored in plain text, which seems unlikely for a bank. [more inside]
Are HDMI cables a requirement for watching commercial Blu-Ray movies? If I put a Blu-Ray drive in my computer, will I be able to watch Blu-Ray movies on a monitor that is hooked up via some non-HDMI cable? (DVI, VGA, whatever) [more inside]
is there a mobile call encryption solution for absolutely untechnical people? [more inside]
How should a business that's about security set up its own secure communications? [more inside]