Encrypting with vim

Last week I suggested that application-specific encryption can solve some data confidentiality problems better than a sweeping approach like whole-disk encryption. One thing you learn in Learning Tree’s Linux introduction course, or the Linux server administration course that follows it, or the optimization and troubleshooting course or another follow-up, is that you are never done […]
Read More ›

Keeping Secrets: Select a Cipher

So you want to encrypt your sensitive information to protect its confidentiality. Good! But exactly how should this be done? There are many ciphers (or encryption algorithms) to choose from. Let’s see what choices are available. Splitting the Choices Selecting a cipher is like sharing bread with your friend. Wait. What? Let’s say you want […]
Read More ›

For Compliance, Keep Control of Your Encryption and Don’t Lose Your Head (Or Your Header)!

Cloud providers tend to be quite good at data integrity and availability. For confidentiality, not so much. IaaS services may provide you with good tools, but you will need to take advantage of them to achieve confidentiality in ways that will satisfy compliance audits. As I mentioned recently, Google’s new “by default” storage encryption isn’t […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.