Jun 102016

If you walked into the office this morning to find that your customer information had been compromised, or a disgruntled employee had wiped a database clean, would you be prepared? Have you set preventative measures in place to safeguard you against total loss? Do you have security features in place to help you retrieve lost data? Are you able to continue with business as usual or would a security breach such as this bring you to a standstill?

It’s a lot to think about, but according to USA Today, approximately 43% of businesses encountered a data breach at some level in the year 2014. With percentages like this, the likelihood of it happening to your business is high. So again, are you prepared? Below are a few signs to determine whether your data loss prevention plan is intact or if your company’s data is vulnerable:

Continue reading »

Flattr this!

Jan 122013

Today i return to the topic of encryption and security and in particular I’ll show how to simply encrypt a file with GnuPG, this can be really usefull to encrypt a single file where you have your passwords or some personal information that you want to keep safer.

GNU Privacy Guard (GnuPG or GPG) is a GPL Licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis’ Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems.

This software is frequently integrated with mail client so it can sign, crypt or do both actions on the mail you send and receive, and now we’ll see how to use it on the command line to encrypt a file.

Continue reading »

Flattr this!

Jul 022012

Article by Giuseppe Sanna

Do you know what you should do to stay away from viruses, bruteforce and all these bad things? There are three possibilities. First, we could not buy a computer or, if you really want to buy it, do not turn it on! or as a last resort (but far less secure) does not ever connect it to any network and use only certified software from CD that you know.

In short, this shows that every operating system that we install has some bug and security flaw. Obviously there are those who have less. Our loved Linux distributions, for example, are among the more secure systems, but not impenetrable. Today, in this short article, we will see how the best of the worst hackers works to get our data, such as PIN and keyword, or just to discover our deepest secrets. And please remember that we’ll take a look at these techniques, as learning tool to be ready to “defend” ourself and our devices from these attacks. Continue reading »

Flattr this!

Cryptkeeper an applet to manage your EncFS

Yesterday I’ve done an introduction to EncFS, a Free (GPL) FUSE-based cryptographic filesystem that transparently encrypts files, using an arbitrary directory as storage for the encrypted files. i’ve show how install and use it from the command line, but there is also an easier way to integrate it with your Desktop: Cryptkeeper. Cryptkeeper is a […]