A Way To Protect
Your Data...

NOT ALL PAGES ARE CONVERTED TO CELL PHONE FORMAT!

Home     Sitemap

<

www.diy-computer-repair.net logo

You Scrambled Your Data With Encryption? WHY?

Encryption uses different methods of making the message unreadable these methods are called "hash tags"...

Why would anyone besides a spy or sekret gov agency want to encrypt or cypher their data?

Well the blame can be put squarely on the internet.

Back before the internet the only time you heard of encryption was in comic books, about spies, or from a cereal box that had a "Sekret Decoder Ring".

When the internet was in it's infancy there were really only two networks:

The network that eventually grew in to the internet that connected different learning institutes together - colleges, universities, and libraries.

Then there was the USA DOD network. (The Department Of Defense).

Where as the infant internet was wide open and anyone that was a student, instructor, worked on a campus, or knew someone could conceivably access another computer somewhere else in the world to find information about a topic if that topic had been input to a local computer's storage. (It wasn't quite as simple as it is to day but if you knew someone or could contact someone at another site you could get your information).

But the DOD network is was a closed network, that is you had to have a security clearance and a need to access a computer that accessed the DOD network. To go along with that the DOD has encryption programs that were introduced with the network it is called a MIL- Spec then followed by some more numbers and characters. Each program under the MIL-Spec has a degree of the method from 256 bits to over 1024K bits (and higher!).

You need this in your IT Tool Box! Get yours today...

Troubleshoot, repair, maintain, upgrade & secure...

    With this!


If you are looking at a program for encrypting your data you want to insure it has the strength to withstand an attack on the method algorithm. That is to say it would take a series of very high powered computers over 200 years to come up with the method algorithm or key to decode your data. The DOD MIL-Spec has this power to resist the cracking of the code that the data is encrypted with for a very long time, all are tested on a CRAY Super Computer before being certified.

How you would use encryption:

After installing your program of choice the first step is to create your keys, there are three keys you need to make.

  • Public key
  • Private key
  • Signature key

What the keys are used for:

  • The public key you give to others whom you want to share documents with that are sensitive in nature, that is you don't want someone to steal your bank account number or some thing that would cause you harm if it was intercepted or stolen by some unscrupulous person (a thief!).
  • The private key you keep in a safe place and only use it when you encrypt your documents, you would also need this key to decrypt the same document or any document received from someone with your public key.
  • The signature key is part of your public key that you would attach to email or other documents to signify that the person sending the document was in fact you. (The thieves have figured out that they can copy and paste a sig key so the significance of this deterrent is diminished some what, at one time spammers were using sig keys to verify their email was genuine).

Want to learn how it works? This is a very good tool to use to learn the ins and outs of encrypting called "PGP" or "Pretty Good Privacy", do a search for either term.

P.S.

If you use this method to protect your data you may want to look at your hiring practices (if you are an employer) the current method of investigating (the pc term is 'vetting') personnel is failing as in the last three cases of hacking and the thief of highly sensitive data from the State Department of the USA. More scrutiny of personnel is required or using this method to protect data is a waste of time and of course money!

Yes, there is more to the encryption story...



Emergency Repair
D
isk (ERD) - Will Yours Work?

Emergency
Repair Disk


Custom made for you...



You keyboard isn't thirsty, and it doesn't need calcium. Milk and other liquids will ruin a keyaboard!


This Web
Site is a
labor of Love
!
But Love
doesn't pay
the bills!

Please chip in $5 to keep it live...

Need A Checklist?

Need A Repair Manual?


    Page copy protected against web site content infringement by Copyscape
 

You can:


Return to
previous page:



 

 

 

 


Thank you for visiting my web site, and please come back again.

This website is not intended for children under the age of 18

Author of this web site: Monte Russell


FTC Endorsement Rules
All testimonials on the DIY Computer Repair web site are from customers who were not paid to comment on any products!


The Flag of The United States of America!   Proudly Made in The U. S. A.

Copyright and Registered to www.diy-computer-repair.net, all thieves will be prosecuted to the fullest extent of international law!www.diy-computer-repair.net

From the Desert South West ~ Arizona, U. S. A.
Copyright DIY-Computer-Repair.Com 2006-2016

 

"You found this web site through:"

Active Search Results


Return to top of Encryption

Using encryption to protect your data.





Home    About    Sitemap
Fix It Blog!

From the Desert South West ~ Arizona, USA
Copyright www.diy-computer-repair.net 2006-2015