Security vs. Security

There is a battle raging over security and you and I are in the middle of it. One the one hand there’s Yahoo, twitter and Google stepping up their use of encryption and the quality of their encryption. On the other hand Foreign Policy reports that the US and some other countries are trying to […]
Read More ›

Google Announces “By Default” Cloud Storage Encryption, Following the Amazon Path

In Learning Tree’s Cloud Security Essentials course we have been discussing Amazon’s two offerings for storage encryption for some time. Amazon’s S3 or Simple Storage Service deals with somewhat vague blobs of storage. A stored object could hold a single file, a bunch of files, whatever you want. An S3 object doesn’t look like a […]
Read More ›

Back up and encrypt

A little over thirty years ago I managed a small mini-computer. We had half a dozen dumb terminals (ADM 3a’s to be specific), a printing terminal and a couple other CRT devices. The total disk storage varied at times from five to seven megabytes. We backed up on 9-track magnetic tape. The tape drive we […]
Read More ›

This Hash Result Startled Me!

Even when you work with this technology, sometimes you are really surprised to find that things don’t work at all as you might expect. Hash functions are one-way operations. It is easy to calculate the hash of even a large piece of data. But it should be impractically difficult to find an input that generates […]
Read More ›

Improving Android Security with Encryption

When developing Android applications for any professional organisation, the question of security always comes up, as indeed it should. There are many issues that should be considered regarding mobile application security so let’s take a look at one common one: data encryption. The first thing to do it to analyse your data and see it […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.