Secure Communications With Encryption

Securing modern communications in the internet require encryption. Existing electronic communication systems can be eavesdropped by a variety of parties. Examples of those parties are employers, ISPs, law enforcement agencies and national security agencies. Many of the communication systems (email, instant messaging) communicate in the internet without using any encryption or user cannot affect the […]

Read more

Inspecting BitLocker encrypted drive in Kali Linux

In this blog post we are inspecting the BitLocker encrypted drive we encrypted in part 2 using Kali Linux. In this tutorial we have booted the Kali Linux in Live CD/USB mode without persistent storage. We are going to use the Dislocker tool to inspect the encrypted BitLocker drive/partition. Installing the Dislocker tool Although Kali […]

Read more

How to keep your data safe from bad guys? Part 1

Losing a mobile device or theft can have serious consequences to a private individual or to a company. It’s almost always guaranteed that mobile device operating system can be compromised if attacker has physical access to the device and the device hard disks are not encrypted. In these kind of scenarios only guaranteed method of […]

Read more