G+

Recent Posts by admin

Cryptocontainer vulnarabilities for remote attacks

At present, cryptocontainers are used to store confidential information both on user’s PCs and in corporate environment of businesses and institutions; they can be created with almost any encrypting software. Cryptocontainers are so widespread because they are convenient in handling encrypted files and offer opportunity to implement on-the-fly encrypting.

Cryptocontainer vulnarabilities

Nonetheless, only a few users realize how vulnerable files in a cryptocontainer become after the latter is mapped as a logical drive of the operational system, and how easily they can be stolen. This is why we have written this article, where we are going to demonstrate on a specific example how to steal information from a cryptocontainer created by means of iconic for RuNet (and others) TrueCrypt encrypting application. However, the same situation is true for any other software, which allows to create cryptocontainers and has no additional functions for protecting encrypted data they store.

Read more

Password or Passphrase: what to choose?

Encrypting a file and then finding yourself unable to decrypt it is a painful lesson in learning how to choose a password you will always remember. Thus when creating a password we are inevitably faced with a dilemma: it must contain a variety of letters, numbers, symbols and be easy to remember.

Password or Passphrase

In this case it is recommended to use passphrases which help us to remember a complex set of characters. For example, it may seem that this combination “2b,0rn2b:Tit?” is difficult to remember but in reality it is simple because it is built on the basis of the utterance that is known to almost every one and it almost impossible to forget.

However, first things first…

Read more

Crypto containers vulnerabilities

One of the most convenient solutions to encrypt files is the creation of virtual encrypted volumes, which are also called crypto containers. However, not everyone is aware of the shortcomings of this method and that mismanagement of their use may do more harm than good. So in this article I want to talk about the crypto containers vulnerabilities and methods that allow dealing with them.

Crypto containers vulnerabilities

Read more

Transparent file encryption on a PC using Cybersafe File Encryption

We’ve added a “transparent file encryption” function to the new version of CyberSafe. In this article, I’ll describe how this function works and its basic abilities, as well as its advantages over EFS, the standard data encryption system of windows.

How does “transparent encryption” work?

CyberSafe’s transparent encryption feature executes a special driver of the file system, which carries out decryption of files when certain applications request it, as well as reencryption after the application is finished with the files. The driver also encrypts all new files added into a secure folder.

The encryption process looks like this:

• the file is first encrypted using the AES algorithm and a 256 bit symmetric key generated randomly by the program;
• the symmetric key is RSA encrypted via the user’s Public Key, which can be up to 8192 bits in length and is stored in an alternate NTFS data stream.

Read more

Methods of hiding files and folders. Part 1

Information for fans

CONCEALMENT OF INFORMATION

Information on the hard drive may be hidden in several ways. We’ll talk about them from simplest to most complex. This article is about how to hide files and folders, not how to find it. Therefore, methods of hiding only delineated. If someone needs more detailed information – he will always be able to find it and, what is more importantly will bring his own unique fragrance by mixing the spices. Concrete recipes will benefit those who seek, not hide.

Read more

UNPACKING SKYPE USING THE DYNAMIC BINARY INSTRUMENTATION. PART 1

Intro

Today, Skype is one of the most popular proprietary software with closed source code that provides encrypted voice and video communications over the Internet between computers (VoIP) that use peer to peer technology (p2p) and paid services for calls to mobile and landline phones.

As of 2011 Skype has 663 million users worldwide. Skype works on the principle of a black box. The program provides very cool features absolutely free and it makes you wonder about why creators of this program, which is freeware, do not disclose its source code and additionally use various protectors (code visualizers) and impede the analysis of the program through any media. It is quite understandable – free cheese is only in a mousetrap. In this article we will try to explore Skype in an extraordinary and newfangled way namely by means of a dynamic binary instrumentation.

Read more

Recent Comments by admin

    No comments by admin yet.

Get download link

We can give you some ideas about keeping your data safe. Sign up for our newsletter, or activate the checkbox and leave the fields blank.