Home » Archive

Articles in the Cryptography Category

Bugs, Cryptography, Debian, Featured, Java, Security, Shell »

[10 Aug 2009 | 14 Comments | ]

Trying to integrate BouncyCastle Cryptography provider in Java can be a nightmare. I read a lot of forums messages about “JCE cannot authenticate the provider BC” and I didn’t find any clear response. After several hours of tweaking and digging I found the main reason of the problem. If you want to use BouncyCastle as Security provider then install it directly on your Java Virtual Machine and remove any library of bc from your application.

Share this post

Cryptography, Debian, Featured, Headline, How-to, Linux, Newbie, Recovery, Security, Shell, Tuning, Ubuntu »

[13 May 2009 | 3 Comments | ]

Gpg is stands for Gnu Privacy Guard and is a free alternative to the PGP cryptographic software. GnuPG (or GPG) follows the RFC 4880 which is the standard specification of OpenPGP. The most important thing GPG is interoperable with PGP. GPG is build as a command line utility but also have several front-ends for KDE, Gnome and other Linux desktops, but also is directly integrated in other software like: Email Clients as Mozilla Thunderbird, Evolution, Kmail, Instant Messaging as PSI, Fire, Browsers as Mozilla Firefox etc.

Share this post

Cryptography, Debian, Featured, Headline, Linux, Security, Shell, Ubuntu »

[5 May 2009 | 2 Comments | ]

This days we shouldn’t trust in anything. The Internet is full of worms, trojans, viruses and they are spreading more and more. Even if you have a firewall is not enough. The best security for your computer is to have it unplugged from power and network … and even then you cannot be 100% about security of your stored data. So today we will talk about encryption under Linux. I will show you how to do it from console and from KDE Windows manager. We have several possibilities to encrypt …

Cryptography, Debian, Featured, How-to, Linux, Newbie, Security, Shell, Ubuntu, Xorg »

[17 Mar 2009 | 2 Comments | ]

Managing more than 80 Linux servers is not an easy job, but with the help of ssh I can distribute a command to all servers without typing, retyping the password every time for that. Don’t understand me wrong, you will need to type a password for accessing this servers, but just one time. If you manage correctly your keys you will don’t need to have any fear in heavy exploiting the ssh keys.

Share this post

Hide …

Apache, Cryptography, How-to, Linux, Php »

[12 Nov 2008 | No Comment | ]

Generating and installing a certificate Is not such a big deal as other may consider but it requires some understanding of how apache and certificates are working.

Share this post

Hide Bookmarks