Security Basics mailing list archives
Re: How operative systems use cryptography
From: Clement Dupuis <clement.dupuis () gmail com>
Date: Wed, 8 Aug 2012 08:02:17 -0400
Encryption could be at different layers. It could be at the application layer where you have a tool with encryption built in. It could be file encryption where you could you a tool like PGP or AXCrypt to encrypt one file at the time. It could be at the session level where SSL or TLS could be used to protect the whole session. It could be at the network layer where IPSEC could be use to encrypt the traffic. It could be at the Data Links layer where many of the non IPSEC tunneling tools would be located. So to make a long story short: it can be use in many places Take care Clement Clement Dupuis, CD Chief Learning Officer (CLO) and Security Evangelist GCFW, GCIA, Security+ 301, CEH V7, CCSA, CCSE, + 12 others SecureNinja Office : +703 535 8600 Mobile: +1 407 433 6444 Email: clement () secureninja com Web: www.secureninja.com Connect with me on LinkedIn | Follow me on Twitter Description: Secure Ninja @ LinkedinDescription: See Us @ YoutubeDescription: Like us on FacebookDescription: Fallow us Twitter 901 N. Pitt Street, Suite 105 Alexandria, VA 22314 Description: Description: sn_logo In Cyberspace: Clement.Dupuis () Gmail com Clement Dupuis, CD President/Founder/Chief Security Evangelist The CCCure Family of Portals ---------------------------------------------------------------------------------------------- Maintainer of : The CCCure Quiz Engine https://www.freepracticetests.org/quiz/index.php?page=home The CCCure Family of Portals http://www.cccure.org The Professional Security Testers Warehouse http://www.professionalsecuritytesters.org/ Knowledge sharing and giving back to the community -------------------------------------------------------------------------------------------------------
Call me to get the best CISSP, Security+, or other Security related training <<
------------------------------------------------------------------------------------------------------- On Tue, Aug 7, 2012 at 4:53 PM, haZard0us <hazard0us.pt () gmail com> wrote:
Hello all, This may like a silly question - no problem, I'm kind of silly in this area - but I want to know where and how operative systems use it. I've searched on google but all I found is about password hashing. And because probably it's used somewhere else, I'm here asking the help for the OSes gurus :) Cheers! --haZ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- How operative systems use cryptography haZard0us (Aug 07)
- Re: How operative systems use cryptography André Silaghi (Aug 08)
- Re: How operative systems use cryptography Clement Dupuis (Aug 08)