background preloader

File Encryption Software

File Encryption Software
AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files. We have received 3,242,753 registrations, so it is tried and proven! AxCrypt is a great complement to services such as Dropbox, Google Drive, Live Mesh, SkyDrive and Box.net . Download All downloads are available via the download page. Features Password Protect any number of files using strong encryption. Right-click integration with Windows Explorer makes AxCrypt the easiest way to encrypt individual files in Windows. Double-click integration makes it as easy to open, edit and save protected files as it is to work with unprotected files. Many additional features, but no configuration required. AxCrypt encrypts files that are safely and easily sent to other users via e-mail or any other means. Donations via PayPal or Payson AxCrypt is Free Software More about Donations More about Open Source Software... Related:  Cryptography

NSA surveillance: how to stay secure | Bruce Schneier | US news Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. For the past two weeks, I have been working with the Guardian on NSA stories, and have read hundreds of top-secret NSA documents provided by whistleblower Edward Snowden. I wasn't part of today's story – it was in process well before I showed up – but everything I read confirms what the Guardian is reporting. At this point, I feel I can provide some advice for keeping secure against such an adversary. The primary way the NSA eavesdrops on internet communications is in the network. Leveraging its secret agreements with telecommunications companies – all the US and UK ones, and many other "partners" around the world – the NSA gets access to the communications trunks that move internet traffic. TAO also hacks into computers to recover long-term keys. Trust the math.

VeraCrypt - Home Hacking Techniques in Wireless Networks Prabhaker Mateti Department of Computer Science and EngineeringWright State UniversityDayton, Ohio 45435-0001 This article is scheduled to appear in “The Handbook of Information Security”, Hossein Bidgoli (Editor-in-Chief), John Wiley & Sons, Inc., 2005. 1. 2. 2.1 Stations and Access Points. 3 2.2 Channels. 4 2.4 Infrastructure and Ad Hoc Modes. 4 2.5 Frames. 4 2.6 Authentication. 5 2.7 Association. 6 3. 3.1 Passive Scanning. 7 3.2 Detection of SSID.. 8 3.3 Collecting the MAC Addresses. 8 3.4 Collecting the Frames for Cracking WEP. 8 3.5 Detection of the Sniffers. 9 4. 4.1 MAC Address Spoofing. 10 4.2 IP spoofing. 10 4.3 Frame Spoofing. 11 5. 5.1 Detection of SSID.. 12 5.2 Detection of APs and stations. 12 5.3 Detection of Probing. 12 6. 6.1 Configuration. 12 6.2 Defeating MAC Filtering. 13 6.3 Rogue AP. 13 6.4 Trojan AP. 13 6.5 Equipment Flaws. 13 7. 7.1 Jamming the Air Waves. 14 7.2 Flooding with Associations. 14 7.3 Forged Dissociation. 14 7.4 Forged Deauthentication. 15 7.5 Power Saving. 15 8. 9. 10. 11.

Email Security using Public Key Cryptography Introduction Anyone using Email that is concerned about the security of the data being transferred should use Public Key Encryption. There are several open source software tools like GnuPG and WinPt to accomplish these tasks. The primary benefit of public key cryptography is that it allows people who have no preexisting security arrangement to exchange messages securely. This Tip describes the installation and use of GnuPG and WinPt If you want to send an encrypted mail to somebody, you encrypt it using the public key. GnuPG ( GnuPG is a complete and free replacement for PGP. WinPt WinPT (Windoze Privacy Tray) is a taskbar utility for doing data en- or decryption. Configuration of GnuPG / WinPt Create the following entries in your registry (regedit) under the path: HKEY_CURRENT_USER\Software\GNU\GnuPG: Run WinPT by double-clicking the executable. Enter the required fields. Press Start to generate your key. Usage It is very important to keep your private key PRIVATE.

Top 75 Network Security Tools CrypTool - Homepage An Overview of Cryptography As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003. While several new algorithms were found during the NESSIE process, no new stream cipher survived cryptanalysis. As a result, the ECRYPT Stream Cipher Project (eSTREAM) was created, which has approved a number of new stream ciphers for both software and hardware implementation. Similar — but different — is the Japanese Government Cryptography Research and Evaluation Committees (CRYPTREC) efforts to evaluate algorithms submitted for government and industry applications. CAST-128/256: CAST-128, described in Request for Comments (RFC) 2144, is a DES-like substitution-permutation crypto algorithm, employing a 128-bit key operating on a 64-bit block. 3.3.

Related: