Easy file encryption using openssl
If you're new to encryption or simply want to encrypt a file but don't want to bother setting up a public/private key pair (required by …
Encrypted data transfer using cryptcat
If you like Netcat but don't want to use it because it offers no encryption you should take a look at Cryptcat, It allows the …
GPG encryption guide part 1
Learn how to use military-grade encryption using GPG. This is the first in a series of guides that will teach you about using gpg for …
GPG encryption guide part 2 (asymmetric encryption)
This is the next post in our series of GPG guides. Here, we cover asymmetric encryption and decryption of data using the gpg command.
GPG encryption guide part 3 (digital signatures)
This GPG guide covers how to digitally sign data in various ways, explains the purpose of digital signatures, and shows how to verify them.
GPG encryption guide part 4 (symmetric encryption)
This GPG guide covers how to use the gpg command for simple yet strong symmetric encryption using various different block cipher algorithms.
Secure encrypted communications using OpenSSH
OpenSSH is an implementation of SSH (secure shell) which is used for secure communication between two machines (a client and a server). OpenSSH is the …