In this article, we are going to tell about transparent encryption implemented by means of CyberSafe Top Secret software. Along with this program, we shall demonstrate how to decrypt files encrypted with EFS.
Recent Posts by admin
At present, cryptocontainers are used to store confidential information both on user’s PCs and in corporate environment of businesses and institutions; they can be created with almost any encrypting software. Cryptocontainers are so widespread because they are convenient in handling encrypted files and offer opportunity to implement on-the-fly encrypting.
Nonetheless, only a few users realize how vulnerable files in a cryptocontainer become after the latter is mapped as a logical drive of the operational system, and how easily they can be stolen. This is why we have written this article, where we are going to demonstrate on a specific example how to steal information from a cryptocontainer created by means of iconic for RuNet (and others) TrueCrypt encrypting application. However, the same situation is true for any other software, which allows to create cryptocontainers and has no additional functions for protecting encrypted data they store.
In this case it is recommended to use passphrases which help us to remember a complex set of characters. For example, it may seem that this combination “2b,0rn2b:Tit?” is difficult to remember but in reality it is simple because it is built on the basis of the utterance that is known to almost every one and it almost impossible to forget.
However, first things first…
One of the most convenient solutions to encrypt files is the creation of virtual encrypted volumes, which are also called crypto containers. However, not everyone is aware of the shortcomings of this method and that mismanagement of their use may do more harm than good. So in this article I want to talk about the crypto containers vulnerabilities and methods that allow dealing with them.
We’ve added a “transparent file encryption” function to the new version of CyberSafe. In this article, I’ll describe how this function works and its basic abilities, as well as its advantages over EFS, the standard data encryption system of windows.
How does “transparent encryption” work?
CyberSafe’s transparent encryption feature executes a special driver of the file system, which carries out decryption of files when certain applications request it, as well as reencryption after the application is finished with the files. The driver also encrypts all new files added into a secure folder.
The encryption process looks like this:
• the file is first encrypted using the AES algorithm and a 256 bit symmetric key generated randomly by the program;
• the symmetric key is RSA encrypted via the user’s Public Key, which can be up to 8192 bits in length and is stored in an alternate NTFS data stream.
Information for fans
CONCEALMENT OF INFORMATION
Information on the hard drive may be hidden in several ways. We’ll talk about them from simplest to most complex. This article is about how to hide files and folders, not how to find it. Therefore, methods of hiding only delineated. If someone needs more detailed information – he will always be able to find it and, what is more importantly will bring his own unique fragrance by mixing the spices. Concrete recipes will benefit those who seek, not hide.
Today, Skype is one of the most popular proprietary software with closed source code that provides encrypted voice and video communications over the Internet between computers (VoIP) that use peer to peer technology (p2p) and paid services for calls to mobile and landline phones.
As of 2011 Skype has 663 million users worldwide. Skype works on the principle of a black box. The program provides very cool features absolutely free and it makes you wonder about why creators of this program, which is freeware, do not disclose its source code and additionally use various protectors (code visualizers) and impede the analysis of the program through any media. It is quite understandable – free cheese is only in a mousetrap. In this article we will try to explore Skype in an extraordinary and newfangled way namely by means of a dynamic binary instrumentation.
Recent Comments by admin
No comments by admin yet.