Security Basics
How operative systems use cryptography Aug 07 2012 08:53PM
haZard0us (hazard0us pt gmail com) (2 replies)
Re: How operative systems use cryptography Aug 08 2012 12:02PM
Clement Dupuis (clement dupuis gmail com)
Encryption could be at different layers.

It could be at the application layer where you have a tool with
encryption built in.

It could be file encryption where you could you a tool like PGP or
AXCrypt to encrypt one file at the time.

It could be at the session level where SSL or TLS could be used to
protect the whole session.

It could be at the network layer where IPSEC could be use to encrypt
the traffic.

It could be at the Data Links layer where many of the non IPSEC
tunneling tools would be located.

So to make a long story short: it can be use in many places

Take care

Clement

Clement Dupuis, CD

Chief Learning Officer (CLO) and Security Evangelist
GCFW, GCIA, Security+ 301, CEH V7, CCSA, CCSE, + 12 others

SecureNinja
Office : +703 535 8600
Mobile: +1 407 433 6444

Email: clement (at) secureninja (dot) com [email concealed]

Web: www.secureninja.com

Connect with me on LinkedIn | Follow me on Twitter

Description: Secure Ninja @ LinkedinDescription: See Us @
YoutubeDescription: Like us on FacebookDescription: Fallow us Twitter

901 N. Pitt Street, Suite 105
Alexandria, VA 22314

Description: Description: sn_logo

In Cyberspace:

Clement.Dupuis (at) Gmail (dot) com [email concealed]
Clement Dupuis, CD
President/Founder/Chief Security Evangelist
The CCCure Family of Portals
------------------------------------------------------------------------
----------------------
Maintainer of :

The CCCure Quiz Engine
https://www.freepracticetests.org/quiz/index.php?page=home

The CCCure Family of Portals
http://www.cccure.org

The Professional Security Testers Warehouse
http://www.professionalsecuritytesters.org/

Knowledge sharing and giving back to the community

------------------------------------------------------------------------
-------------------------------
>> Call me to get the best CISSP, Security+, or other Security related
>> training <<
------------------------------------------------------------------------
-------------------------------

On Tue, Aug 7, 2012 at 4:53 PM, haZard0us <hazard0us.pt (at) gmail (dot) com [email concealed]> wrote:
>
> Hello all,
>
> This may like a silly question - no problem, I'm kind of silly in this
> area - but I want to know where and how operative systems use it.
>
> I've searched on google but all I found is about password hashing. And
> because probably it's used somewhere else, I'm here asking the help for the
> OSes gurus :)
>
> Cheers!
>
> --haZ
> ------------------------------------------------------------------------

> Securing Apache Web Server with thawte Digital Certificate
> In this guide we examine the importance of Apache-SSL and who needs an SSL
> certificate. We look at how SSL works, how it benefits your company and how
> your customers can tell if a site is secure. You will find out how to test,
> purchase, install and use a thawte Digital Certificate on your Apache web
> server. Throughout, best practices for set-up are highlighted to help you
> ensure efficient ongoing management of your encryption keys and digital
> certificates.
>
>
> http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442
f727d1
> ------------------------------------------------------------------------

>

------------------------------------------------------------------------

Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442
f727d1
------------------------------------------------------------------------

[ reply ]
Re: How operative systems use cryptography Aug 08 2012 09:18AM
André Silaghi (andre silaghi googlemail com)


 

Privacy Statement
Copyright 2010, SecurityFocus