Questions tagged [file-encryption]

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

471 questions
-1
votes
1 answer

Permutation based file secure

I have a thought. 1. Take a file. 2. Read number of bytes. If its less than 2048, padd it till 2048 3. Read each byte. And create a single file which contains the particular byte. Give a random name to the new file. 4. Do this for all the bytes. 5.…
-1
votes
1 answer

How long does it take to crack a 100-letter long winrar password?

i´m interested in how long time it would take for a super computer dedicated to crack to crack a 100-letter long winrar password. The password contains Lowercase, Uppercase, Digits, Specialcharacters, Punctuation and Brackets by this i mean every…
MrDude
  • 13
  • 1
  • 3
-1
votes
2 answers

Disk encryption vs encrypted file container

Is there any difference between disk encryption and encrypted file container in terms of security? Which one is better?
user215422
  • 75
  • 1
  • 1
  • 7
-1
votes
1 answer

Storing files in database through encryption and Viewing them only on providing key for the file

I have this use case: User1 uploads his file into the database which should be encrypted. Any other users who request that file, user1 will be notified for approval, on approving other users should be able to view the file but can't download the…
-1
votes
2 answers

Is it possible to recreate a file using only its hash

To my knowledge, a file can have only one hash and a hash corresponds to only that file(keeping aside the 2 file one hash bug). Using that knowledge is it possible to make an algorithm to recreate a file using solely the hash?
Vedant
  • 111
  • 1
  • 4
-1
votes
1 answer

About important hacks in history

I would like to know how important hacks happened, because I can figure out how they hacked a website but I can't figure out how did they hacked into NASA International Space Station source code. Or that information was explicitly passed through the…
-1
votes
1 answer

Check to see if public key provided is PGP/openPGP compatible

I'm still new to encryption and differences between an RSA public keys and PGP/openPGP compatible public keys. First of all, is there a difference between an RSA public key and a PGP/openPGP compatible public key? If there is a difference, is there…
-1
votes
2 answers

Inherited a project with a backdoor to manage; code was promptly stolen by a known entity. What's next?

I have a doozy for you - almost posted this in the project management stack. I was asked to oversee a development of a project. At some point the previous manager thought it was prudent to create a backdoor deep in the guts of an obscure Java…
dsp_099
  • 165
  • 6
-1
votes
2 answers

How to securely encrypt and decrypt files between a server and a client PC

I am building an application where users send files with a password for encryption to a server via ssl. They can then share the encrypt files with people I will then build a desktop application in C++ where a user can select the file and decrypt it…
Dr Manhattan
  • 141
  • 6
-1
votes
1 answer

How to protect EXIF data against editing/deleting in jpeg file?

Is there any option to protect EXIF data against editing or provide password protection? I came accross the idea of creating executable file from image file, so that someone can view image the way is defined with no possibility to modify. Is this…
-1
votes
2 answers

Limit possible harm of ransomware on a fileserver

First to say: I know I need a backup and I have one of course but my question isn't about the safety of the data but about how to reduce the possible time that is needed to restore data. I'm already limiting the write access of all users as far as I…
davidb
  • 4,285
  • 3
  • 19
  • 31
-1
votes
2 answers

Which is more secure a full disk or file encryption?

There are probably two ways to encrypt your computer full disk encryption which completely locks down the computer between when it is off and when it has booted but after everything loads you computer is not encrypted anymore and then there is…
Henry WH Hack v3.0
  • 2,109
  • 2
  • 23
  • 37
-2
votes
1 answer

Decryption of data

Apparently, for privacy I have encrypted data on my mobile. A few pics (family ones). This I did through ES File manager, was using AppLock previously but encountered a few errors for storage so I decided to encrypt it through ES. And as it has…
-2
votes
2 answers

Identifying/decrypting hashed/encrypted data

This weekend I took part in an security challenge. I had great fun doing it but i found a huge gap in my knowledge that I'm really keen to fill and hope someone here can help get me pointing in the right direction. Midway into the challenge I…
-2
votes
1 answer

Is GPG symmetric (decryption) vulnerable?

Suppose a file (say, a text file source.txt) was encrypted into danger.gpg using GPG symmetric encryption on a compromised device. Since the device is compromised, danger.gpg could have been created by a modified program masquerading as GPG, or the…
1 2 3
31
32