1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Securing files


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Securing files

RSS Kategorie Pfeil IT Security Nachrichten vom | Quelle: reddit.com Direktlink öffnen

Hey, so when I was younger I shared a computer with my dad. As I had to hide my... Downloads from him, I used to 7zip them in an encrypted zip. After that I converted it to a txt file and took an amount of gibberish out into another txt file (enough to corrupt the archive). I then saved one into a computer game folder (I think as a dll? Or maybe a data file to blend in) and another one somewhere in sys 32.

Obviously this was massive overkill as my dad wasn't that computer literate. Something I watched recently got me thinking about it again though. How secure would that actually be against someone with a lot of power and time to spend (i.e governments). Would you even be able to find the files hidden away like that? And even then how would you know to combine them? Completely theoretical but it could be a practical way to secure rarely accessed files.

submitted by /u/nerdles666
[link] [comments] ...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu Securing files






Ähnliche Beiträge

  • 1. Strelka - Scanning Files At Scale With Python And ZeroMQ vom 137.87 Punkte ic_school_black_18dp
    Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin's Laika BOSS and similar projects (see: related projects), Strelka's purpose is to perform
  • 2. TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors vom 114.4 Punkte ic_school_black_18dp
    Original release date: March 15, 2018Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bur
  • 3. TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors vom 108.54 Punkte ic_school_black_18dp
    Original release date: October 20, 2017 | Last revised: October 23, 2017Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Securi
  • 4. Announcing the general availability of Azure premium files vom 76.27 Punkte ic_school_black_18dp
    Highly performant, fully managed file service in the cloud! Today, we are excited to announce the general availability of Azure premium files for customers optimizing their cloud-based file shares on Azure. Premium files offers a higher level of p
  • 5. Larger, more powerful standard file shares for Azure Files now in preview vom 67.47 Punkte ic_school_black_18dp
    Better scale and more power for IT pros and developers. Azure Files has always delivered secure, fully managed cloud file shares with a full range of data redundancy options. While customers love the simplicity of Azure Files and the hybrid capabiliti
  • 6. Scanner-Cli - A Project Security/Vulnerability/Risk Scanning Tool vom 61.6 Punkte ic_school_black_18dp
    The Hawkeye scanner-cli is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your pre-commit hooks and your pipelines.Running and configuring the scannerThe Hawkeye scanner-cli assumes that your dire
  • 7. Companies Have Little Control Over User Accounts and Sensitive Files: Study vom 57.94 Punkte ic_school_black_18dp
    Lack of Control Over Sensitive Files Leaves Companies Open to GDPR Failure Security teams are urged to assume intruders are already on their networks. The quantity and frequency of data loss breaches lends credence to that assumption. The implication
  • 8. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 57.22 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 9. TA17-181A: Petya Ransomware vom 52.8 Punkte ic_school_black_18dp
    Original release date: July 01, 2017 | Last revised: July 28, 2017Systems Affected Microsoft Windows operating systems Overview This Alert has been updated to reflect the National Cybersecurity and Communications Integration Center's (NCCIC) analysi
  • 10. TA17-132A: Indicators Associated With WannaCry Ransomware vom 49.87 Punkte ic_school_black_18dp
    Original release date: May 12, 2017 | Last revised: May 19, 2017Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with repor
  • 11. BeRoot- A Post Exploitation Tool To Check Common Misconfigurations For Windows Linux And Mac OS vom 49.87 Punkte ic_school_black_18dp
    BeRoot- A Post Exploitation Tool To Check Common Misconfigurations For Windows Linux And Mac OS A compiled version is available here.It will be added to the pupy project as a post exploitation module (so it will be executed in memory without touc
  • 12. Time for VT Enterprise to step up vom 49.87 Punkte ic_school_black_18dp
    Late last year we announced the release of VT Enterprise for existing VT Intelligence subscribers. Since the launch, we have iterated on and improved upon VT Enterprise and it is time to begin a full deprecation of the old VT Intelligence interface. Today, we are