Kjw; gf;fk;
vk;ikg; gw;wp
kPs;gpuRu chpik
cq;fs; fUj;J
News in English
Day in Pictures
njd;wy; cyf thndhyp
njd;wypy; Njl
Practice: Coding For Each Purpose
Date&Written by:(29.9.2005- Karan)
For what coding?
Data are today stored more than ever electronically and conveyed. It is the more important to secure protect-worth before an unauthorized access. Coding helps.

We present first the methods to you and explain to you then, how the coding functions by means of the free Tools "Gnu PP". Subsequently, we still deal with EFS von Windows XP pro and 2000 and to call for Windows XP Home an alternative.

The Mail is the electronic counterpart to the open postcard. And everyone, which gets a computer into the hands, can access with or without special aids the data stored on it. If one made oneself these disturbing facts times conscious only, fast the need after the protection of the own privatsphaere arises. Coding is an adequate solution. Read on is worthwhile oneself thus.

The methods
There are two different methods of the coding - the symmetrical and the asymmetrical coding. With the first procedure the transmitter codes the data with the same key, which the receiver uses for decoding. The problem thereby is the safe transmission of the key, without third listens.

Better is solved with the asymmetrical coding. Here the receiver makes a "Public available key", by sending him for example by Mailanhang to future transmitters. Transmitters use this key, in order to code messages. Decodes the coded data the receiver with its "private keys", which he possesses alone. This method is more surely, required however clear more computing time, straight with larger data sets.

In practice hybrid technologies are often used with the datentransfer, which combine both methods. Most prominent example is "Pretty Good Privacy" (PGP). Who wants to code data only locally, so that other users of the system cannot access, a symmetrical coding is usually sufficient.

PGP: Thus it goes
PGP combines an asymmetrical RSA (Rivest, Shamir and Adleman) with a symmetrical ID I/O coding (international DATA Encryption standard). PGP puts on thereby a coincidental session key, which is used for the symmetrical ID I/O coding. Then the "session key" is coded asymmetrically over RSA and attached to the packet.

The advantage of this hybrid combination is that the receiver must decode only the relatively small "session key" (128 bits) over the slow asymmetrical method, that remaining extensive packet is symmetrically decoded. The data are fast decoded by this trick, without a secret key will transfer must.

After the installation you call and produce this Tools over "start, programs" the "Gnupp, GNU Privacy Assistant" a new pair of keys with your name and your Mailadresse.

You find a short explanation of the different functions on the following page.

Gnu PP: The fundamental functions
* Public key
There are several possibilities of making the Public accessible keys for others. If you start first the "GNU Privacy Assistant", mark then your key and you click on "export". In the next dialogue you write the key into any, locally stored file, which you pass on by Mail. Alternatively you send it directly to a public key server, from which one is preset already.

* Code
In order to code own Mails, you mark your text and copy it with < Strg> into the intermediate file. Then you call the along-installed Tool Winpt over the Desktop left, click within the info. range (Systray) with the right mouse button on the new key Icon and select "intermediate file, coding". You carry the coded text simply with < Strg> into your Mail, which send you away now.

* Keys secure
In order to secure the "Public key" your Mailpartner on your system, you store first their key file into any listing. Subsequently, you start the "GNU Privacy Assistant", click there on "import" and look for the stored key file.

* Decode
If you receive a PGP-CODED Mail, mark all contents with < Strg> and copy it with < Strg> into the intermediate file. Then you call as when coding Winpt, click with the right mouse button on the Icon and select "intermediate file, decoding/examining". Decoded contents are now in the intermediate file and can be inserted with < Strg> in any editor or the Mail programm.

A specification of Gnu PP and Winpt find you in the Download included with the READ ME files.

EFS: Coding with on-board means of Windows 2000 and XP pro
For the protection of local data Windows offer 2000 and XP pro the coded file system EFS (Encrypting file system). Thus the user receives a very comfortable possibility of coding files on NT telex partitions. Technically as with PGP a hybrid technology puts behind.

En and decoding function completely comfortably over the context menu of files and files: They click on "characteristics", select "extended" and activate the clicking box before "contents code, around data to protect". So treated files and file appear green according to standard dyed in the Windows Explorer, and you can to be accessed as had.

Other users of the system can just as little read contents of the files however as a potenzieller data thief, who moves forward PE or Knoppix with beard. Without the "private key", which you possess by the coding, the data remain useless.

Crosscrypt: The alternative for Windows XP Home

Thus it goes:
Unpack archives into a file, and you start the Install.BAT. Thus you play the driver and the Tool Filedisk.EXE up. Open the file Mountimg.BAT in an editor, and you indicate a free drive assembly letter in the second line. If you start the batch file by doubleclick, enter as password "secretly", and you press < Return >. Thus you assign to our 5 MT large image Demo.IMG the selected drive assembly letter. By renewed start of Mountimg.BAT you solve the integration again. Neither files nor files of the virtual drive assembly should be opened.

More to Crosscrypt
Examples for the use of Filedisk.EXE and information about it, how you put on new image files, find you in the file Example.TXT. Archives Crosscrypt on CCD contain also the program Crosscryptgui.EXE, over which you can serve Crosscrypt by mouse.

Powered By StrangerNetWork Operations Department.

Copyright © 2005-10 ThenralWorldNews.com, All Rights Reserved