Posts

Showing posts from September, 2017

PGP Security!

Image
The PGP (Pretty Good Privacy) is a crypto system that combines symmetric and asymmetric techniques of encryption, developed by Phil Zimmermann which goal was to protect the distributed data across the internet with a digital signature or key. PGP offers authentication of messages and verification of it's integrity in case the message has been compromised and to know if the message has been read by the person that is supposed to. This is the tutorial I followed, in this video you can check how to send a encrypted message and how to decrypt. ( http://notes.jerzygangi.com/the-best-pgp-tutorial-for-mac-os-x-ever/ )

Encrypt your device

Image
The software I used to encrypt a usb was Veracript ( https://veracrypt.codeplex.com/ ). This software is a multi-platform fork of Truecrypt and open-source. In this blog we will follow the instructions in the VeraCrypt documentation. Download VeraCrypt Click on the 'Create New Volume' Select the 'Create and encrypted file container' and then click 'Next' Select the 'Standard Installation' in the type of installations  In the 'Volume Location' window, select where you cant to put your encrypted folder and select 'Next' Select an encryption algorithm, in this case we will select AES and for 'Hash Algorithm' we selected SHA-512, then click 'Next' Choose the volume size, then 'Next' Write a password Select a file system, we selected FAT, for cluster 'Default' and unchecked the 'dynamic' option. Then click in the 'Format' button Then, click 'Finish' Finally, click 'Mou

Certifications in Computing Security

Image
There are a lot of certifications in Computer Security, from Servers to Browsers, there are many areas in which you can become a certified programmer. To be a certified programmer in a specific area can make your resume looks better and a bigger salary just because you have a certifications company backing that you know something. This is a list of some of the certifications involving security that you can get: CISCO CERTIFIED NETWORK PROFESSIONAL ROUTING AND SWITCHING (CCNP) CISCO CERTIFIED NETWORK ASSOCIATE SECURITY CREDENTIAL (CCNA) COMPTIA’S SECURITY+ CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) CERTIFIED INFORMATION SECURITY MANAGER (CISM) The network area is one of the most important areas, the part of the connections can be very vulnerable and not many people know about this risk.  Another big thing is the security inside the front-end, you need to protect the data is handled and the way a site or program manages it's routes.