Showing posts with label Cryptography. Show all posts
Showing posts with label Cryptography. Show all posts

Friday, October 14, 2011

No Charge: Two Live Online CISSP Exam Prep Clinics

Earn Your CISSP in 2011

At no charge, you can attend TWO live online CISSP Exam Prep Clinics taught by a leading (ISC)2® instructor!

Register at: http://www.ufairfax.net/cissp-2011-hlist/
  • CISSP Clinic I: Domains 1 – 4
  • CISSP Clinic II: Domains 5 – 10
Both clinics are available live online and on demand following the webinar*.

If you’ve been studying for the CISSP exam, you’ll want to attend these TWO live online CISSP Exam Prep Clinics sponsored by University of Fairfax, Information Security Community, 1105 Media-- FOSE & GovSec-- and Tenacity.

You’ll discover strategies to increase your chances of success! You’ll learn techniques to help you quickly assess which questions to address first, which to delay answering and how to eliminate the less likely answers. The Clinics include tips for all 10 domains covered in the exam.

Register today so you pass the CISSP Exam in 2011!
http://www.ufairfax.net/cissp-2011-hlist/

When:

Thursday, October 20, 2011, 2 – 3 PM ET

Both clinics are also available on demand following each webinar*. There is No Charge for you to attend! Register now to prepare for your CISSP Exam.

Register Now: http://www.ufairfax.net/cissp-2011-hlist

Tuesday, September 20, 2011

Two Live Online CISSP Exam Prep Clinics

Free Online Course Sponsored by University of Fairfax

At no charge, you can attend TWO live online CISSP Exam Prep Clinics taught by a leading (ISC)2 instructor!

Register at: http://www.ufairfax.net/cissp-2011-hlist/
  • CISSP Clinic I: Domains 1 – 4
  • CISSP Clinic II: Domains 5 – 10
Both clinics are available live online and on-demand following the webinar*.

If you’ve been studying for the CISSP exam, you’ll want to attend these TWO live online CISSP Exam Prep Clinics. You’ll discover strategies to increase your chances of success! You’ll learn techniques to help you quickly assess which questions to address first, which to delay answering and how to eliminate the less likely answers.

The Clinics include tips for all 10 domains covered in the exam.

Register today so you pass the CISSP Exam in 2011!
http://www.ufairfax.net/cissp-2011-hlist/

When:
  • Thursday, October 13, 2011, 2 – 3 PM ET
  • Thursday, October 20, 2011, 2 – 3 PM ET
Both clinics are also available on demand following each webinar*. There is No Charge for you to attend! Register now to prepare for your CISSP Exam.

--> http://www.ufairfax.net/cissp-2011-hlist/

Saturday, June 25, 2011

Logical Security offering 10 Free On-Line Videos

Discussing Security Topics Now Available!

Logical Security is providing free videos that discuss various security topics. Some of these topics are: Block Ciphers, Digital Certificates, ITIL Problem Management, and Wireless Security.

The videos can be found at http://www.logicalsecurity.com/resources/resources_videos.html

Saturday, June 11, 2011

Kaspersky KryptoStorage

Personal Digital Vault

Kaspersky KryptoStorage securely protects your personal files against unauthorized access and data theft using cutting-edge transparent encryption technology and allows deleted files to be permanently erased from your computer.

Kaspersky KryptoStorage ensures that your encrypted data stays confidential in the event of malware attacks, unsecure WiFi connections and even if your laptop or storage device is lost or stolen. The encrypted data is only accessible via a strong password that is highly resistant to brute force attacks.

Product Highlights
  • Encrypts folders and disk partitions to prevent data theft
  • New files can be added to encrypted folders or containers at any time
  • Containers can be transferred to other storage media and computers
  • Encrypts data "on the fly" with full access to the encrypted information
  • Limits access to data to prevent unauthorized modification or removal
  • Uses AES-128 algorithm for strong encryption
  • Allows data to be permanently deleted
  • Fully Compatible with Microsoft's new operating system, Windows 7
Refer here for further details.

Friday, May 14, 2010

Improved Online Security for a Tenth of the Cost

Leak-proof error correction-based protocol to ensure integrity

Computer scientists in the United Kingdom are developing a system that would offer a high level of security at one-tenth the cost of existing systems that use special quantum technology. The fiber-optics system would offer security to two online users by broadcasting a continuous stream of information around the communication loop.


Access to the information would be limited to users who have a secret key. "It is like using background noise to allow two users to share a secret that no one else knows," says University of Hertfordshire professor Bruce Christianson. The fiber-optics system uses a leak-proof error correction-based protocol to ensure integrity.

"Various people have proposed similar ideas in the past, but our system has introduced a novel error correcting scheme, which means we can use cheap fiber-optics technology and make it work at amazingly high transmission rates," Christianson notes.

Refer here for more details.

Friday, February 26, 2010

Using TrueCrypt for disk encryption

How to use TrueCrypt for disk encryption

You're well aware of the benefits provided by encryption, but many organizations don't have the budget or resources to purchase an expensive encryption tool. In this TechTarget screencast, learn about a free open-source disk encryption tool.

Learn how to use this tool to not only create an encrypted drive, but also a hidden drive as an additional data protection measure.

Wednesday, February 10, 2010

Flaw in e-passports that makes them susceptible to identification

e-Passports Threaten your Privacy

University of Birmingham (UB) researchers have discovered a flaw in e-passports that makes them susceptible to identification. The defect is in the design of the radio-frequency identification tag used by e-passports. The discovery makes it possible to detect the passport of a particular person from a distance of a few meters.

An attacker can track the movements of a specific passport by replaying a particular message. The research has shown that there is a flaw that makes it possible to identify the movements of a particular passport without having break the passport's cryptographic key. E-passports have been issued to more than 30 million people.

An e-passport is the most recent generation of passport. It is an identification document combining a traditional passport with a RFID tag capable of performing cryptographic operations, storing biometric data and other personal information. All e-passports have RFID chips embedded into them – these carry personal information such as date of birth, passport number and a photograph, and they respond to any radio signal sent to them.

Cheap and easily available RFID tag readers can be used to send a signal to a passport. University of Birmingham computer scientists have shown that by replaying a particular message, the attacker can distinguish any passport from any other.

An attacker could identify a target by using the reader to send a signal to the target’s passport and then, for instance, build a device that could be left by a door to detect when the target entered or left the building.

Please refer here to read more details.

Sunday, December 16, 2007

Cryptograf

Send Message Keep Secret

Cryptograf is a mobile based software which helps you to encrypt your SMS and MMS.Allows users to send encrypted and digitally signed SMS and MMS on widely available Symbian smartphones. User experience of mobile messaging with CryptoGraf is simple when encrypting messages to send...or when decrypting received messages. Users generate their own private encryption key and save the corresponding public key (for distribution) as a standard secure digital certificate.

Crypto
The Art and Science of Ensuring the Security and Integrity of Messages

Graf
In Greek "grafo" means write.

Cryptography related technologies, for privacy protection, have been available for use on computers for a long time. People have been sending encrypted email messages for more than 10 years. It's about time for technical innovations to make cryptography usable on the mobile phone. Currently, use of crypto for business and trade has overtaken the volume of crypto used by governments and military combined. Crypto is now used to encode satellite television signals, protect banking and ATM networks, and almost every purchase done over the internet.

More Information: CryptoGraf and Software Download: CryptoGraf Download