The most recent content from our members.
Last time I explained how quantum computing relies on the phenomenon of 'superposition'. And though this year the NSA is spending $79.7 million on quantum computing research and development projects, the recent award-winning achievements in particle physics tell us that a quantum computing platform would most likely take…
NSA-related news in recent months warrants revisiting an earlier discussion of AES. In an article on the NSA's Bluffdale, Utah datacenter, I noted that despite the peta-flop processing power of those systems AES-192 and AES-256 are still currently unassailable encryption schemes: "For now, however, nobody and no system on…
It would be really awesome to have the ability to monitor certain files/folders/etc for encryption. This would be a great defense against the CryptoLocker style ransom-wares that are still hitting some of our clients pretty hard. We would then be able to proactively run a script to stop all access to client directories,…
It looks like you're new here. Sign in or register to get started.