Search Results

Search found 9423 results on 377 pages for 'hardware encryption'.

Page 28/377 | < Previous Page | 24 25 26 27 28 29 30 31 32 33 34 35  | Next Page >

  • Debian as USB hardware portable as possible

    - by James Mitch
    I have recent hardware, 64 bit, pae and so on. But I'd like to have my Debian installation on a USB HDD. Installing Debian to USB is solved. I used the i386 architecture image. But a pae kernel has been installed. I want to be able to travel with my USB HDD and therefore I want best possible hardware compatibility. My friends and family have sometimes older hardware, but always i386, just sometimes without 64 bit or pae. Never met someone with sparc or other architectures. What should I do to get non-pae kernel and maximum hardware compatibility?

    Read the article

  • Blackberry device GPS hardware specs [closed]

    - by colemanm
    I'm looking to find out detailed specifications for the built-in GPS hardware in the Blackberry Bold and Curve devices (9000 and 8350). RIM's documentation includes just a rudimentary description of the specs, but I'm looking for things like the actual detailed hardware/chipset info so we can research the accuracy needs for some upcoming projects we have. Knowing simply "A-GPS support" isn't really good enough... Does anyone know of any resources for finding advanced specs for built-in Blackberry hardware?

    Read the article

  • RAID - software vs. hardware

    - by Robert MacLean
    I have always used hardware based raid because it (IMHO) it's on the right level (feel free to dispute this) and that OS failures are more common to me than hardware issues. Thus if the OS fails the raid is gone and so is the data, where on a hardware level regardless of OS the data remains. However on a recent Stack Overflow podcast they stated they would not used hardware raid as the software raid is better developed and thus runs better. So my question is, is there any reasons to choose one over the other?

    Read the article

  • Easy Install Resets Hardware Settings

    - by bob5972
    I think there's a problem with the Easy Install setup. I selected "Installer disc image," and it came up and said that it would use "Easy Install," I think I hit next, and then I went back changed my mind, and selected "I will install the operating system later." After finishing the wizard, I think it still went and ran Easy Install, because it auto-installed VMware tools and I never got to select anything for my windows setup. Then, when it was finished, all the hardware changes I had made were lost. The RAM was changed from 2 GB back to the default of 1 GB, my CD ROM drive was set back to "Use a Physical Drive" and "Connect at Power On", and the Floppy Drive was also set to "Connect at Power On", after I disabled them. I was trying to install Windows 7, and I wasn't sure if I could change the RAM settings after installation without needing to reactivate it, so I deleted the VM and tried to start over. This time, the "Installer disc image" had my Win7 image pre-selected, so I clicked "I will install it myself later," set my hardware again, and tried to boot off my CD. Again,it did an Easy Install, and reset my RAM and my drive settings. So I deleted it again and the third time it still had the Win7 image pre-selected, but this time I unplugged all the drives and let it try to boot off the empty harddrive and fail, and made sure it kept all my hardware settings. Then, I powered it off, put my Win7 image in the guest CD ROM, and powered it on. This time it finally let me run the installer and pick my language, and type a user name. This time when I powered it off it kept my hardware settings. I can duplicate the error by doing exactly the steps above. Creating a new VM, selecting my "Installer Image," hitting next, going back, selecting "I will Install it myself," and then finish the wizard, and customizing my hardware right before the end, setting the CD Rom drive to the same installer media, and setting "Connect on Power On." (If I start it without the CD ROM in the first time, it doesn't do it). When I power on, I'm not prompted for any install information (like language and user name), and when it runs the first timemy hardware choices are reset (like the RAM back to 1 GB). If it helps, I'm running VMware Workstation 7.0.1 build-227600 on Gentoo Linux

    Read the article

  • Easy Install Resets Hardware Settings

    - by bob5972
    I think there's a problem with the Easy Install setup. I selected "Installer disc image," and it came up and said that it would use "Easy Install," I think I hit next, and then I went back changed my mind, and selected "I will install the operating system later." After finishing the wizard, I think it still went and ran Easy Install, because it auto-installed VMware tools and I never got to select anything for my windows setup. Then, when it was finished, all the hardware changes I had made were lost. The RAM was changed from 2 GB back to the default of 1 GB, my CD ROM drive was set back to "Use a Physical Drive" and "Connect at Power On", and the Floppy Drive was also set to "Connect at Power On", after I disabled them. I was trying to install Windows 7, and I wasn't sure if I could change the RAM settings after installation without needing to reactivate it, so I deleted the VM and tried to start over. This time, the "Installer disc image" had my Win7 image pre-selected, so I clicked "I will install it myself later," set my hardware again, and tried to boot off my CD. Again,it did an Easy Install, and reset my RAM and my drive settings. So I deleted it again and the third time it still had the Win7 image pre-selected, but this time I unplugged all the drives and let it try to boot off the empty harddrive and fail, and made sure it kept all my hardware settings. Then, I powered it off, put my Win7 image in the guest CD ROM, and powered it on. This time it finally let me run the installer and pick my language, and type a user name. This time when I powered it off it kept my hardware settings. I can duplicate the error by doing exactly the steps above. Creating a new VM, selecting my "Installer Image," hitting next, going back, selecting "I will Install it myself," and then finish the wizard, and customizing my hardware right before the end, setting the CD Rom drive to the same installer media, and setting "Connect on Power On." (If I start it without the CD ROM in the first time, it doesn't do it). When I power on, I'm not prompted for any install information (like language and user name), and when it runs the first timemy hardware choices are reset (like the RAM back to 1 GB). If it helps, I'm running VMware Workstation 7.0.1 build-227600 on Gentoo Linux

    Read the article

  • Windows Server 2008 R2 bare metal restore to different hardware

    - by S Falken
    Scenario: I have a Windows Server 2008 R2 x64 installation whose main disk drive is now 7 years old and showing signs of age. For the last couple of months it's been displaying increased errors and requirements to run checkdisk. I have successfully created a bare metal restore (BMR) image on a separate data drive on the server, which can be seen from the Windows Recovery console; I tested it by booting to and using the Windows Server installation DVD's recovery utilities. The BMR image includes the system drive with boot partition, system state, and the D:\ drive of the server, which is where I have followed the practice of installing any program that does not require a C:\ installation path. Therefore, the BMR includes both the C:\ and D:\ drives, system state and boot partition. The C:\ drive is a 7-year old Seagate 160GB. The D:\ drive is a rather newer 120GB Western Digital. I have purchased a 128GB solid state Samsung 830 that I want to restore these partitions to, using the BMR. Questions: In the above-referenced article, Microsoft seems to be indicating that I am only able to restore to like-kind hardware, which doesn't help at all and is difficult to believe. Is this really true? I've cleaned these drives up and minimized the size of partition they require. C:\ will need about a 70GB partition, and the data on D:\ will need about 50GB. Will Windows Server backup allow me to restore the BMR to newly-created partitions on the SSD, discarding extra space? I don't need a "how-to": I just need an "is it possible". Justification: Before posting this question, I checked ServerFault articles with the following titles, but none of them were about this exact scenario: Restore SBS 2008 Backup to Same Hardware but Different Disk Configuration Restoring Windows Server 2008 to different hardware - OEM License Restoring II6 server after a hardware failure windows 2008 r2 fail to restore Domain controller failed to restore using windows backup tools How does restore to dissimilar hardware work? Migrating Windows 2008 R2 from a PC to a different PC TFS 2005 Server restore from one hardware to another I also researched Microsoft but only received an oblique answer which was not precisely aimed at my question, at the following URL: http://support.microsoft.com/kb/249694#method3

    Read the article

  • Server Hardware on the Desktop

    - by jcnnghm
    When I rebuild my desktop, I'm thinking of using server hardware instead of desktop hardware. I want to do this so I can easily add a lot of ECC memory (~20GB), and possibly more than one processor. I know that video hardware could be a problem, especially because I use 4 monitors. I should be fine with this, as long as I have two pci-e channels. Are there any downsides to doing this? Anything I'm not seeing?

    Read the article

  • SQL Server 2000 and SSL Encryption

    - by Angry_IT_Guru
    We are a datacenter that hsots a SQL Server 2000 environment which provides database services for a product we sell that is loaded as a rich-client applicatin at each of our many clients and their workstations. Currently today, the application uses straight ODBC connections from the client site to our datacenter. We need to begin encrypting the credentials -- since everything is clear-text today and the authentication is weakly encrypted -- and I'm trying to determine the best way to implement SSL on the server with minimizing the impact of the client. A few things, however: 1) We have our own Windows domain and all our servers are joined to our private domain. Our clietns no nothing of our domain. 2) Typically, our clients connect to our datacenter servers either by: a) Using TCP/IP address b) Using a DNS name that we publish via internet, zone transfers from our DNS servers to our customers, or the client can add static HOSTS entries. 3) From what I understand from enabling encryption is that I can go to the Network Utility and select the "encryption" option for the protocol that I wish to encrypt. Such as TCP/IP. 4) When the encryption option is selected, I have a choice of installing a third-party certificate or a self-signed. I have tested the self-signed, but do have potential issues. I'll explain in a bit. If I go with a third-party cert, such as Verisign, or Network solutions... what kind of certificate do I request? These aren't IIS certificates? When I go create a self-signed via Microsoft's certificate server, I have to select "Authentication certificate". What does this translate to in the third-party world? 5) If I create a self-signed certificate, I understand that the "issue to" name has to match the FQDN for the server that is running SQL. In my case, I have to use my private domain name. If I use this, what does this do for my clients when trying to connect to my SQL Server? Surely they cannot resolve my private DNS names on their network.... I've also verified that when the self-signed certificate is installed, it has to be in the local personal store for the user account that is running SQL Server. SQL Server will only start if the FQDN matches the "issue to" of the certificate and SQL is running under the account that has the certificate installed. If I use a self-signed certificate, does this mean I have to have every one of my clients install it to verify? 6) If I used a third-party certificate, which sounds like the best option, do all my clients have to have internet access when accessing my private servers of their private WAN connection to use to verify the certificate? What do I do about the FQDN? It sounds like they have to use my private domain name -- which is not published -- and can no longer use the one that I setup for them to use? 7) I plan on upgrading to SQL 2000 soon. Is setup of SSL any easier/better with SQL 2005 than SQL 2000? Any help or guiadance would be appreciated

    Read the article

  • How can I know if a computer supports hardware-assisted virtualization before I purchase the computer?

    - by Poaters
    I'm an iPhone programmer who is no longer in possession of a personal Mac computer on which to use XCode. I have two Windows desktops, and I would like to run OS X in VMWare rather than purchase Apple's expensive hardware. However, neither of my machines supports hardware-assisted virtualization, which is required to virtualize OS X. I went shopping online for a computer today, since I've been planning to purchase a laptop anyway, but sites like Best Buy don't appear to give any indication of whether or not a product supports this. Is there any other site out there or some trick to figuring this out other than buying the machine and running Microsoft's nifty little detection tool?

    Read the article

  • High end mobile workstations with pointer stick

    - by Elijah Lynn
    I am looking for a list of higher end mobile workstations that run Ubuntu/Kubuntu well and also have a hardware pointer stick. Here's an illustration of one (from sciencesurvivalblog): I wouldn't mind getting a Macbook Pro and wiping it but they refuse to use pointer sticks and to me, they are extremely efficient. I see a lot of potential for Lenovo thinkpads as well. System 76 said they have no plans to implement a hardware pointer stick so that leaves them out as well. Any ideas?

    Read the article

  • How to enable desktop effects on Ubuntu 10.04 after upgrade from Ubuntu 8.04?

    - by Manohar Bhattarai
    I upgraded my Ubuntu 8.04 to Ubuntu 10.04. When I try to enable desktop effects it says "Desktop effects could not be enabled". The output of "lspci | grep VGA" is : 00:02.0 VGA compatible controller: Intel Corporation 82845G/GL[Brookdale-G]/GE Chipset Integrated Graphics Device (rev 03) Hardware drivers says there is no propriority hardware driver. I installed nVidia driver but I think my is an Intel graphics device. Please help.

    Read the article

  • How Can I Generate Equivalent Output Using the CryptoAPI and the .NET Encryption (TripleDESCryptoSer

    - by S. Butts
    I have some C#/.NET code that encrypts and decrypts data using TripleDES encryption. It sticks to the sample code provided at MSDN pretty closely. The encryption piece looks like the following: TripleDESCryptoServiceProvider _desProvider = new TripleDESCryptoServiceProvider(); //bytes for key and initialization vector //keyBytes is 24 bytes of stuff, vectorBytes is 8 bytes of stuff byte[] keyBytes; byte[] vectorBytes; FileStream fStream = File.Open(locationOfFile, FileMode.Create, FileAccess.Write); CryptoStream cStream = new CryptoStream(fStream, _desProvider.CreateEncryptor(keyBytes, vectorBytes), CryptoStreamMode.Write); BinaryWriter bWriter = new BinaryWriter(cStream); //write out encrypted data //raw data is a few bytes of binary information byte[] rawData; bWriter.Write(rawData); With encrypting and decrypting in C#, this all works like a charm. The problem is I need to write a small Win32 utility that will duplicate the encryption above. I have tried several methods using the CryptoAPI, and I simply do not get output that the .NET piece can decrypt, no matter what I do. Can someone please tell me what the equivalent C++ code is that will produce the same output? I am not certain just what methods of the CryptoAPI the .NET functions use to encrypt the data. What options are used, and what method of generating the key is used? Before someone suggests that I just write it in C# anyway, or create some common library bridge for them, those options are unfortunately off the table. It really has to work in Win32 with .NET and without using a DLL. I have some leeway in changing the C# code. I apologize in advance if this is bone-headed, as I am new to encryption.

    Read the article

  • What (pure) Python library to use for AES 256 encryption?

    - by Daren Thomas
    I am looking for a (preferably pure) python library to do AES 256 encription and decryption. This library should support the CBC cipher mode and use PKCS7 padding according to the answer to an earlier question of mine. The library should at least work on Mac OS X (10.4) and Windows XP. Ideally just by dropping it into the source directory of my project. I have seen this by Josh Davis, but am not sure about how good it is and if it does the required CBC cipher mode... Scanning the source suggests it doesn't

    Read the article

  • Can I encrypt value in C# and use that with SQL Server 2005 symmetric encryption?

    - by Robert Byrne
    To be more specific, if I create a symmetric key with a specific KEY_SOURCE and ALGORITHM (as described here), is there any way that I can set up the same key and algorithm in C# so that I can encrypt data in code, but have that data decrypted by the symmetric key in Sql Server? From the research I've done so far, it seems that the IDENTITY_VALUE for the key is also baked into the cypher text, making things even more complex. I'm thinking about just trying all the various ways I can think of, ie hashing the KEY_SOURCE using different hash algorithms for a key and trying different ways of encrypting the plain text until I get something that works. Or is that just futile? Has anyone else done this, any pointers? UPDATE Just to clarify, I want to use NHibernate on the client side, but theres a bunch of stored procedures on the database side that still perform decryption.

    Read the article

  • Creating a global variable on the fly. [PHP ENCRYPTION]

    - by stormdrain
    Is there a way to dynamically create constant variables on the fly? The idea is that upon logging into the system, a user would be asked to upload a small text file that would be fread, and assigned to a var that would be accessible throughout the system. If this is possible, just to be clear, would this variable then only be accessible to that user and only while the session is alive? Security being the main concern here, would it be more practical to store the var in a session variable? The plan: Data in the db will be encrypted via mcrypt, and the key will be stored on USB thumbdrives. The user will insert the thumbdrive when going to access the system. Upon logging in, the app will prompt the user to upload the key. They will navigate to the thumbdrive and key. Via fopen and fread, the key will be assigned to a global var which will then allow access to encrypted data, and will be used to encrypt new info being entered to the db. When the user logs out, or session times out, the global var will become empty. Thanks!

    Read the article

  • How does the receiver of a cipher text know the IV used for encryption?

    - by PatrickL
    If a random IV is used in encrypting plain text, how does the receiver of the cipher text know what the IV is in order to decrypt it? This is a follow-up question to a response to the previous stackoverflow question on IVs here. The IV allows for plaintext to be encrypted such that the encrypted text is harder to decrypt for an attacker. Each bit of IV you use will double the possibilities of encrypted text from a given plain text. The point is that the attacker doesn't know what the IV is and therefore must compute every possible IV for a given plain text to find the matching cipher text. In this way, the IV acts like a password salt. Most commonly, an IV is used with a chaining cipher (either a stream or block cipher). ... So, if you have a random IV used to encrypt the plain text, how do you decrypt it? Simple. Pass the IV (in plain text) along with your encrypted text. Wait. You just said the IV is randomly generated. Then why pass it as plain text along with the encrypted text?

    Read the article

  • Is there a built-in class to handle encryption in C#?

    - by badpanda
    I need to encrypt bytecode to send over a connection to a webservice, preferably using a GUID as a key. I have done a bit of research and found several classes developed for a similar purpose, but haven't been able to turn up much that is built into the Windows libraries. My question is: Is there something built in to C# that performs this task? If there is not, I would very much appreciate any suggestions as to implementation. Thanks!! badPanda

    Read the article

  • iPhone Encryption Standard - Will this implementation bye-pass apple check?

    - by Futur
    Hi All, I found this implementation, and i am not sure whether we can use this implementation and apple will bye-pass extra check, this is a base-64 implementation. The source code link is http://blog.objectgraph.com/wp-content/uploads/2010/04/CryptTest.zip The web page link is : http://blog.objectgraph.com/index.php/2010/04/20/encrypting-decrypting-base64-encode-decode-in-iphone-objective-c/ Kindly advice me friends.

    Read the article

  • Is there any sample Java code that does AES encryption exactly like this website?

    - by user1068636
    http://www.hanewin.net/encrypt/aes/aes-test.htm If you go to this website and enter the following: "Key In Hex": 00000000000000000000000000123456 "Plain Text in Hex": 00000000000000000000000000000000 And click on "Encrypt" button you will see the ciphertext in hex is: 3fa9f2a6e4c2b440fb6f676076a8ba04 Is there a Java program out there that I can do this (I.e. Is there an AES library that will input the "Key In Hex" above with the "Plain Text In Hex" above and generate the Ciphertext in Hex above? )? I would appreciate any advice or links to Java sample code that does this.

    Read the article

  • HTTPS Everywhere Extension Updates to Version 3.0, Adds Protection for 1,500 More Websites

    - by Asian Angel
    If one of your security goals is to encrypt your communication with websites as much as possible, then you will definitely be pleased with the latest update to the HTTPS Everywhere extension for Firefox and Chrome. This latest release adds encryption protection for an additional 1,500 websites to help make your browsing experience more secure than ever. Images shown above courtesy of EFF. You can learn more about this latest release along with installing the extension for Firefox and/or Chrome directly from the blog post linked below… HTTPS Everywhere 3.0 protects 1,500 more sites [via Softpedia] HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference How To Troubleshoot Internet Connection Problems

    Read the article

  • how to resize an encrypted logical volume?

    - by Nirmik
    I installed Ubuntu with encryption and LVM on my entire haddisk... Now I want to resize it. How do I do This... Following this link gave me errors on step 2 - How to resize a LVM partition? error ubuntu@ubuntu:~$ sudo e2fsck -f /dev/sda5 e2fsck 1.42.5 (29-Jul-2012) ext2fs_open2: Bad magic number in super-block e2fsck: Superblock invalid, trying backup blocks... e2fsck: Bad magic number in super-block while trying to open /dev/sda5 The superblock could not be read or does not describe a correct ext2 filesystem. If the device is valid and it really contains an ext2 filesystem (and not swap or ufs or something else), then the superblock is corrupt, and you might try running e2fsck with an alternate superblock: e2fsck -b 8193 what do I do?

    Read the article

  • What do you use to bundle / encrypt data?

    - by David McGraw
    More and more games are going the data driven route which means that there needs to be a layer of security around easy manipulation. I've seen it where games completely bundle up their assets (audio, art, data) and I'm wondering how they are managing that? Are there applications / libraries that will bundle and assist you with managing the assets within? If not is there any good resources that you would point to for packing / unpacking / encryption? This specific question revolves around C++, but I would be open to hear how this is managed in C#/XNA as well. Just to be clear -- I'm not out to engineer a solution to prevent hacking. At the fundamental level we're all manipulating 0's and 1's. But, we do want to keep the 99% of people that play the game from simply modifying XML files that are used to build the game world. I've seen plenty of games bundle all of their resources together. I'm simply curious about the methods they're using.

    Read the article

< Previous Page | 24 25 26 27 28 29 30 31 32 33 34 35  | Next Page >