background preloader

How To Add a Second Layer of Encryption to Dropbox [Updated]

How To Add a Second Layer of Encryption to Dropbox [Updated]
I started using BoxCryptor, which is mentioned in this thread. Free for up to 2Gb. Basically, it mounts an encrypted drive on your computer, and whatever you drop there gets encrypted and sent to another folder, which can be your Dropbox folder. If you're going to get your encrypted material somewhere else, you'll need BoxCryptor installed there as well. BoxCryptor can only be ran by system administrators. Another thing you can do is to encrypt files individually before dropping them on Dropbox. You can zip with 7Z via command line. I won't show how now, because I don't have the time... but I'm going to do it for myself sometime, then I can post it. [] Related:  Secure data and data transfer

Transfer Web Files Directly To Your Dropbox Folder With URL Droplet The Drops To The Cloud All the cloud services more or less work the same way – you upload your files to the cloud, and you can then access them from anywhere with an Internet connection. But things become impractical when the files you want to put in the cloud are also coming from the web. URL Droplet is the service that will cut out the middle man – your computer’s hard drive. To use URL Droplet, visit the site and click “Login“. Then you have to give permission to URL Droplet to connect to your Dropbox account. Let The Download Begin To download a file, you need the direct download link of that file to be pasted to the URL Droplet address field. For example, how can you save converted YouTube videos to your Dropbox account? You can also try another way to acquire the download address. Armed with the download address, go to the URL Droplet website and paste the link. The download progress can be monitored by looking at the bar. Have you tried URL Droplet? Image credit: wwarby

Public-key cryptography An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key. After obtaining an authentic copy of each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a symmetric cipher. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Message authentication involves processing a message with a private key to produce a digital signature. Understanding[edit]

How To Encrypt Your Dropbox Data With ENCFS [Linux] Aside from the never-diminishing threat of a break-in by hackers, Dropbox has also said that it will turn over your data to the government if requested. This implies that, even if the data on their servers is encrypted (and not just the connection), they have a way to decrypt it and see what you’re storing. Although I’m sure most of you don’t have anything to hide, we feel more comfortable with some privacy. Therefore, encrypting the files before they are sent to the Dropbox servers is the way to go in order to keep eyes away. There are a couple different ways of achieving this, as of late. The Idea The technologies behind ENCFS are a pretty tricky to explain, so I’ll let you do that on your own time if you are interested. Installing To get started, you’ll first need to install ENCFS. install /path/to/gnome-encfs /usr/local/bin . Create your Encryption Setup Next, we’ll need to actually create the setup. encfs ~/Dropbox/.encrypted ~/Private . Next we need to automatically mount this setup.

untitled Dropbox Forms: Receive files from your web site to your dropbox! Just follow the instructions below. If you're already a Jotform user, you can skip to step 2 and integrate your existing forms. 1.Create your Upload form Go to Jotform Form Builder and drag a File Upload field from the Form Tools menu to your workspace. 2.Setup your Dropbox From the same page, Click Integrations toolbar under Setup & Embed Tab, from the wizard select Dropbox Forms from the Most Popular list. 3.Manage your Integration After giving JotForm permissions. 4.Share! All that's left is to have your form on your web site.

InfoSec Handlers Diary Blog - Hashing Passwords After talking about SQL Injection, this is the second part of the mini series to help you protect yourself from simple persistent attacks as we have seen them in the last couple months. A common MO employed in these attacks is to steal passwords from a database via sql injection. Later, the attacker will try to use these passwords to break into other sites for which users may choose the same password. Of course, part of the problem is password reuse. First of all: What is hashing? Storing a password as a hash will make it difficult to figure out the actual password a user used. A hash isn't fool proof. Probably the most important defense against rainbow tables is the idea of introducing a "salt". In order to use a "salt", the salt value and the users password are first concatenated, then the string is hashed. Another trick to harden a hash is to just apply the same algorithm multiple times. Here a proposal to create difficult to reverse hashes with salt: ------ Johannes B.

Overview - Welcome to Flubaroo The grades created by Flubaroo will be located in an adjacent worksheet called "Grades", as shown: For each submission, Flubaroo will show which questions were answered correctly ("1" point"), which incorrectly ("0" points), and which were not graded. If less than 60% of students got a question correct, the question will be highlighted in orange to alert you. Additionally, students who scored less than 70% on the assignment will be highlighted in red. The Flubaroo menu will now offer you the ability to email each student their grades, view a summary report, or regrade the assignment. You might want to regrade the assignment if more students submitted answers, or if you want to throw out a question that most students got wrong. If you choose to email each student their grade, you'll be given the option to include an answer key in the email. Choosing "View Report" shows you a summary report of the grading. Want to try it out?

Storing Passwords - done right! Written by: Christoph Wille Translated by: Bernhard Spuida First published: 1/5/2004 Viewed 257725 times. 1766 ratings, avg. grade 4.76 In very many - not to say almost all - Web applications user data is administered, from Web forum to Web shop. These user data encompass login information of the users which contain the password besides the user name - and this in plain text. A security leak par excellence. Why is storing the user name and password in plain text a security leak? Well, imagine a cracker gaining system access through eventual OS or server software errors, and being able to read the user database. How can this security risk be eliminated? What is a Salted Hash? A hash is a numerical value of fixed length which unequivocally identifies files of arbitrary legth. The reason for this is that usually so called 'Dictionary Attacks' are run against hashed passwords - a good example being the MD5 hashed passwords of NT4. Storing the Salted Hash Generating Passwords - done right!