Information Security Resources

Entries for the ‘Security Tools’ Category

How to Generate a Digital Certificate for S/MIME (Secure MIME) email Communication

For most S/MIME compatible email clients, you must obtain a PKCS12 format certificate before you can upload your private key and/or others’ public key for secure email communication. The first way you can do this is, of course, to apply such a certificate from a trusted Certificate Authority (CA), such as VeriSign. But can you […]

Leave a Comment

Public Key Infrastructure: Using Self Generated Public and Private Key Pairs to communicate Without PKI

Can we use self generated Public and Private Keys to communicate without Public Key Infrastructure? Originally, you can use PGP (Pretty Good Privacy) freeware to communicate freely. PGP freeware can be downloaded here: However, since they have recently taken down the freeware for the Windows platform, I’ll show you how to use another piece […]

Leave a Comment

Using Fport to Check for Trojan Horses

This article will tell you about a simple way to check whether your computer system has a trojan horse (spyware) implemented. A trojan horse or spyware operates by running on your computer and opening a communication port (TCP port) to communicate with the remote hacker, so he or she can “spy” on your computer. The […]

Leave a Comment

How to Use TrueCrypt (USB Data Encryption) on a Computer without Administrative Rights

Referring to my post about TrueCrypt, I mentioned a disadvantage of using this software — you cannot use it on a computer without administrative rights. Actually, there is a third-party GUI interface program that can be run on a computer without administrator rights, and you are still able to access the container file of TrueCrypt […]

Comments (1)

Hide Information in a Picture File? Yes, Using Steganography

The term steganography refers to the technique of hiding information within a certain “writings” or anything transmitted with your communication system in such a way that no one other than the intended recipient knows there is a hidden message. This technique differs from cryptography, which encrypts the message in order to prevent someone from gaining […]

Leave a Comment

USB Data Encryption and Decryption on a Computer without Administrator Rights?

As I promised in the post about a data encryption utility called TrueCrypt, I am going to show you another utility that can be used to encrypt portable data on a USB drive. Unlike TrueCrypt, in which you must have administrative rights to activate the program for accessing the encrypted data, this program allows you […]

Comments (1)

How to Keep your Portable Data from Being Stolen

Do you worry about your data from being stolen if you lost your USB thumb drive or other portable data storage? Here is a free solution. Try TrueCrypt. TrueCrypt is an open sourced project providing a simple solution to encrypt your USB data (or actually data in any other movable or internal storage of your […]

Comments (9)

Instant Linux Security Tools

How can I get Linux security tools installed on my Windows Desktop instantly? Answer: Using VMware Using VMware, now you can easily try out Linux security tools. Read on… As I said in my previous post, VMware allows you to instantly install another instance of an OS on your computer system. In the case of […]

Leave a Comment