popularencryptionmethodologies

popular encryption methodologies

encryption algorithms locking up your sensitive data best cipher data

Welcome to the page where we break down the best techniques to encrypt your data. Our goals are to make a system that is basically transparent, has a high degree of security, is auditable and compliant with institutional and government standars.

xfs looped through aes mounted on a loopback filesystem

ssh and pgp are a couple of apps that benfit or are directly related to encryption. a veriety of algorithms can be chosen.

the new via c7 chip has a hardware enryption module that will offload the work that supports the encryption from the cpu - it is a mth intensive compute as you can imagine, anyways this new chip will allow you to effectively encrypt at line speed. you gain encrption for common protocols and lose no speed. this is a win win solution for smb and other sectors where they need cheap ways to implement network wide encryption in a wan or with remote computers for example.

trucrypt is a tool that allows you to partion thumb drives, usb devices, and partitions in a variety of algorithms, widely used with built in plausible denialbility via twin volumes there are a host of tutorials on getting the most out of trucrypt. Exploring the possibilities and sussing out the wealth of infor mation on infosec and computer security is a must if you have web sites or are involved in development or auditing of systems

osx has a built in encrption app / linux has large number of encryption based apps

popular protocols like wep are weak, best advised to use wpa/ psk at a minimum or no wireless at all if you are really concerned about security of your lan.

additionally most all os support interface to authentication protocols and servers in the guise of active directory/ldap/radius/pam and two factor authentication methods and plugins like kerberos.

if you have any questions please email me opensourceservers@gmail.com

irongeek is a great site that is heavily security minded, he has some great videos which illustrate the techniques behind both protecting data and also cracking weak protocols.

Highlander Corporation has a plug and play device which is truely unique, it is called the highlander vault and supports many different and secure algorithms for locking down your data- meets stringent requirements more info

more detail analysis can be found here

http://en.wikipedia.org/wiki/Information_security

http://en.wikipedia.org/wiki/NSA_encryption_systems

also if you get a chance please check out the vmware image of ossim a network security disrto that is plug and play - it contains numerous tools to track changes on you network- check out the picture/screenshot http://opensourceservers.googlepages.com/ossimvmwareimage

if you have vmware installed running ossim is as easy as pointing to the iso from within the virtual machine (cd settings/boot from iso/rtm) and booting and entering a couple of passwords and you will have a much greater appreciation for what is going on in your network- ntop/ids snort+base/extensive logs and analysis engine.

recommended!

Lastly, check out this security distro- it is an iso image which means you download it and burn it to a cd and then boot to your cd first, you may have to set boot order of your computer from the bios but then after entering root for user prompt and toor for password and startx command at shell prompt you have a full blown linux security distro ready to take for a ride- if you normally get your ip from a local dhcp server you should be able to surf the internet with firefox and communicate with other machine and scan you local environment- remember a ping sweep of tour local subnet only takes a few seconds with nmap from insecure.org nmap -sP 192.168.0.0/24 or whatever your subnet happens to be...

BackTrack Wiki. This site is an open Wiki for the BackTrack Live CD by Remote Exploit . It's taken us almost 5 months to pull ourselves out of the beta ...

backtrack.offensive-security.com/

toll Free in the USA: +1 (877) 780-8833

Tel +1 (207) 780-8833

Fax +1 (207) 780-8787

below taken from stored data files/ hunt group/ huntsville

The Highlander Vault is the world's first plug and play, biometric (finger) access, USB-interfaced, portable, encrypted data storage disk drive. This exciting new storage product interfaces with any Windows XP desktop computer or laptop system via the system's USB 2.0 port, and does not require host system administrative privileges to install or to use the device, nor does it require device driver or application software installation.

All user data files stored on the Highlander Vault are completely encrypted with 256-key AES encryption via a complete suite of on-drive software (Ciphermate) that provides easy-to-use Vault creation, access, backup, and management controls.

Users access their encrypted Vault data via fingerprint scan and/or password protection, and up to ten (10) data Vault accounts are definable on each Highlander disk drive. Additionally, each individual data Vault provides a single user or an unlimited number of pre-registered users access to the encrypted data. The Highlander Vault disk and enclosure is physically quite small, measuring approximately 3''x 5''x .75'' and each unit weighs less than 6.5 ounces. When shipped, the Vault includes its enclosed disk drive with biometric scanner, a USB interface cable, and a carrying pouch. There is no CD shipped and no software to install , the unit has all of the required software preinstalled on the drive. Just plug and-play it's that easy.