![]() Last time I checked my own site I had an A+ rating and that is easily achievable with modern certificates/server programming. Roellgen?ħ:49 – I didn’t even look at his website security – ‘F’ is terrible. Their “Polymorphic Medley Cipher V.2 – AES, Twofish, Serpent, Cast-256, RC6, SEED, Camellia and Anubis cascaded with keyed cipher selection” source code is here □ They showcase their “Polymorphic Giant Block Size Cipher” and even have a pseudo-scientific paper to support their wild claims. Worst still I found who I believe to be the parent company, offering a piece of software called TurboCrypt, which supposedly offers “1024 bit Polymorphic Encryption and 4×256 bit AES”. They say their product is FIPS “compliant” but not “certified”, presumably to mislead gullible purchasers. The official AES standard is 128, 192 or 256 bits and not 128, 256, 512 or 1024 bits… a definite sign of snake oil. In an upcoming release, we will offer a 1024-bit encryption option.” Our encryption is registered and government approved, and is FIPS 140-2 compliant. “You have the option to encrypt your vaults with 128, 256, or 512-bit AES ciphers. My suspicions were aroused when I saw this claim: I was researching Sandisk Secure Access Software when I discovered the supplier: EncryptStick. I’m going to post this in the next Squid Blog but whilst we’re on-topic you can all have a good laugh at this. In the long run I like to think I spend a smaller fraction of my career chasing down crap like this. And code takes several times longer to write, and in the short run I’m less productive than a lot of programmers. You use unsigned if there’s any chance of overflow because signed overflow is undefined behavior… and so on. You don’t fail to handle an exception because the exception won’t happen if the system you’re interacting with does its job. So, no, in my universe you don’t skip a checksum just because it’s also supposed to have been done somewhere else. Sometimes I hate being right, but color me completely unsurprised. Second, there are powerful entities who are motivated to ensure that they fail in subtle ways that are exploitable but won’t usually be noticed. I assumed this because of a combination of two reasons: First, it was no longer source code where everyone could see how it was done and verify that it was right. I probably am paranoid in fact I assumed from the outset that Intel would get the AES instruction wrong. Thus I wind up with lots of checks for things that “Can’t happen” if some other system is working correctly, and most of the same people who call me a “raging hair-triggered paranoid doing unnecessary work for no reason”, are later astonished how often those checks fail. The overall operation is far from being a challenge, as you can lock directories with just a couple of clicks and keystrokes.It depends on your programming environment, but I always start by assuming that whatever the code I’m writing must interact with is an application written by Satan. ConclusionĪny Folder Password Lock looks like an excellent way to encrypt your files, hide or disguise them as other applications. So if you are curious about the number of encrypted directories, switch to this panel. Furthermore, disguising will also require you to set up a password, so even if the directory is camouflaged, it will still be protected.ĪS a small mention, the History button will take you to a panel where every directory you've locked/unlocked will be there, neatly listed, with date, status, and all. For now, you can disguise your folders as Recycle Bin, Printer, Network Dialing, or Network Neighborhood icons. As it's probably obvious, disguising a folder means that its default icon will be changed. The disguising feature strongly resembles the locking one, but with a slightly different touch. Of course, this icon aspect doesn't apply to hidden folders. This is how you tell when a directory was successfully locked. Once locked, the folder's icon will be changed to the one Any Folder Password Lock sports. That hiding part can be done from the dropdown menu that comes with the password panel. Just select the one you need to encrypt, choose a password, and decide if you want to hide it or keep it visible. Any Folder Password Lock is an intuitive tool that will not only help with locking folders but with hiding and disguising them as well. obviously, to be able to secure directories, you'll need a dedicated software app, as online services for this type of job are not really abundant. Locking a folder down might not be an operation that every Windows user had done or heard about, but it's incontestably useful, at least for individuals who share their or transfer data through not-so-secure mediums.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |