Blog Archives

Crypto Hypno: Cryptography basics (Part 5 of 5)

Crypto Hypno

Ahh the refreshing scent of cryptography.  It’s like a fresh rose on valentines day. In my last post you learned about VPNs.  I showed you the nitty gritty itty details about the protocol and both phases (hopefully you didn’t phase out

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, What Is, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Crypto Hypno: Cryptography basics (Part 4 of 5)

Crypto Hypno

If you’ve been following this series from its infancy, you should already know the basics of encryption, symmetric/asymmetric encryption, and message hashing.  Today we’re going to tie everything together in tidy little bow.  You’ll learn about the two primary ways we

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Crypto Hypno: Cryptography basics (Part 3 of 5)

Crypto Hypno

In the first article you learned about encryption basics.  In the second part, I showed you the difference between symmetric and asymmetric encryption.  And now you’ve graduated to the hypnotizing world of hashing. We’re going to talk about data integrity and

Posted in Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Crypto Hypno: Cryptography basics (Part 2 of 5)

Crypto Hypno

In the first part of our series on cryptography, you learned about the data plane, control plane and management planes.  The data plane is when all the bits board first class and fly to some exotic location in French Polynesia.

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Crypto Hypno: Cryptography basics (Part 1 of 5)

Crypto Hypno

Today we’re going to look into how we can make it safer to send traffic on networks.  By embracing encryption we can protect the data that devices use to communicate with each other.  So let me start by saying cryptography is an

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,