File Security and Encryption - any information?

I'm impressed with the file sharing (free version) but if its used for business information and documents how secure are they from prying eyes / unauthorised download / hacking etc. ?

Thank you for your post. You can read about security for Acrobat.com here.

Similar Messages

  • Remote desktop is it secure and encrypted for windows 7 and windows 2008 servers

    Remote desktop is it secure and encrypted? any supporting documenting showing if it is secure and encrypted .

    Hi,
    Yes, RDP is secure and encrypted. RDP uses RSA Security's RC4 cipher, a stream cipher designed to efficiently encrypt small amounts of data. RC4 is designed for secure communications over
    networks. Administrators can choose to encrypt data by using a 56- or 128-bit key.
    For more details, you can refer to the following:
    Standard RDP Security
    http://msdn.microsoft.com/en-us/library/cc240771.aspx
    Enhanced RDP Security
    http://msdn.microsoft.com/en-us/library/cc240795.aspx
    Secure RDS (Remote Desktop Services) Connections with SSL
    http://technet.microsoft.com/en-us/magazine/ff458357.aspx
    Configure Security Settings for Remote Desktop Services Connections
    http://technet.microsoft.com/en-us/library/cc753488.aspx
    Thanks.
    Jeremy Wu
    TechNet Community Support

  • SOAP Security and Encryption...

    Hi All,
    My scenarios are SOAP to IDOC Async and IDOC to SOAP Async.
    How to achieve security and encryption in SOAP side?

    Hi Arthita
    You can use SSL encryption via SAML (http://scn.sap.com/docs/DOC-16302)
    Or you migt find it usefull to check out Siva Kumar Arivinti document http://scn.sap.com/docs/DOC-26144 SSL Configuration in SAP ABAP AS and JAVA AS – Step-by-step procedure.
    Regards Torben

  • Trim, SSD, and Encryption--Any point to urandom first?

    If I am setting up an encrypted system, on a SSD, with Trim enabled, is there any point to writing random data to the drive first (with urandom) as one would normally do?
    My understanding is that Trim will write zeroes to unused portions of the drive anyway, to keep track of what space is available for optimizing writes to the drive (for wear leveling, etc.). So if in the long run, what the drive will look like is random information, where data is present, and zeros where there is no data. Then why not just zero out the drive to begin with, rather than using urandom?
    In fact, would zeroing the drive to start help Trim from the beginning do what it's supposed to do?
    Thanks for any thoughts.

    Yes, the point of overwriting the entire disk with random data, before setting up an encrypted system, is so that it is not possible to see where there is data and where there is just empty space on an encrypted drive. This is recommended by every encryption setup guide I have ever seen, including the Arch Wiki.
    I'm not sure where I created the impression that I was asking a question about identifying bad blocks. I didn't mention them in my post and I don't know what it has to do with setting up an encrypted system (on an SSD with the Trim feature), which is the topic of my question.
    The issue is, although it is normal to first overwrite the entire disk with random data, for an encrypted system, if you enable the Trim feature on an SSD it will write zeros to free space (as files are deleted, I believe). This helps the SSD do wear leveling and (I think) operate faster, issues exclusive to SSDs as opposed to regular magnetic hard drives. So once you enable the Trim feature, you will, at least (I think) in the long run, defeat the benefit of having written random data to the entire drive when the system was set up.
    A lengthy explanation can be found here, for anyone interested: www.asalor.blogspot.com/2011/08/trim-dm-crypt-problems.html
    My question is, will writing random data not only defeat the security/encryption benefits, but also make it hard for the SSD to operate the Trim function effectively? Will the SSD see all the random data as used space and not perform effective wear leveling? In which case, is it better to just zero out the drive first and then create the encrypted system, so that the SSD can use Trim properly?
    Thanks to anyone who knows about how Trim with SSDs works and how random data could effect it.
    Last edited by cb474 (2012-04-12 00:44:29)

  • Security and encryption inside Integration Server

    Hi,
    is it possible to encrypt the entire message process INSIDE PI. I don't mean "Adapter-Inbound" or "Adapter Outbound" communication, but rather "Adapter-to-Integration Server" and "Integration-Server-to-Adapter"?
    For example, that the message payload cannot be seen in SXMB_MONI etc.
    A potential scenario are HCM payroll data exchange.
    Thanks for any idea.
    -hs

    For example, that the message payload cannot be seen in SXMB_MONI etc.
    1) Do not log the message (check the blog: /people/michal.krawczyk2/blog/2007/04/30/xipi-personalized-logging-tracing) ....monitoring may not be possible then.
    2) restrict the user from viewing the payload....adding new-users to the no-view list to be managed by the Admins
    3) Make use of java logic in adapter module to encode the message before passing it to SXMB_MONI.....not all adapters support modules...complexity increases....decoding logic at receiving end required
    4) Make use of com.sap.security.api.ssf...disadvantages same as for point 3.
    Regards,
    Abhishek.

  • Where is the FF4 "lock" icon that indicates secure and encrypted transmission?

    Prior to FF4 upgrade, a 'lock' icon would appear on bottom of screen to indicate when of if transmission was secure. With FF4 this icon never appears (or I don't know where to find it). Does it have a new location? Is there some way to have it return for those sites with which transmission will be encrypted?

    The lock has been replaced by the [[Site Identity Button]], which will tell you whether the connection is encrypted ''and'' the identity of the web site on the other end of the connection.
    The reason for this change is that it is important to verify identity, not just security. The "lock" icon could be misleading, because an encrypted connection is not actually secure unless the identity is verified too.

  • Anyone ever heard of .QTX files? And have any idea of how to open them?

    I've been send a how load of these files that are suppose be colours. There in .QTX format and I have no Idea how to open them. Help.

    Qtx
    and
    http://industrial.datacolor.com/support/wp-content/uploads/2013/01/Datacolor-QTX-File-Spec ification.pdf

  • I might have accidentally deleted the app store. I downloaded webroot secure anywhere and tried to delete some files securely and I might have chosen the app store.

    Is there is a way to re download the app store?

    1. Remove the worthless "Webroot" product by following the instructions on this page. If you have a different version of the product, the procedure may be different.
    Back up all data before making any changes.
    2. If you don't already have a current backup, back up all data, then reinstall the OS.* You don't need to erase the startup volume, and you won't need the backup unless something goes wrong. If the system was upgraded from an older version of OS X, you may need the Apple ID and password you used.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    If you installed the Java runtime distributed by Apple and still need it, you'll have to reinstall it. The same goes for Xcode. All other data will be preserved.
    *The linked support article refers to OS X 10.10 ("Yosemite"), but the procedure is the same for OS X 10.7 ("Lion") and later.

  • Encrypted document using Apple File Security won't open

    Back in 2000 I was using an iMac G3 with OS 9. I created a MS word document with MS 2000 and encrypted it using the Apple File Security. Since then I have upgraded to an iMac G5 with OS 10.4 and OS 9 for older applications.
    Since this is a legal document, I now need to decrypt it and I am not sure if I used a password to encrypt this document. I have opened up the key chain in OS 9 and, I don't see any saved passwords. I have opened up MS Word and don't see anything about a password for this application. When I open up the encrypted document it shows it to be over 300 pages, and when I select "Get Info" it shows that this document is unlocked, but I see on the desktop the document with a yellow key symbol.
    Is this a locked document? Why does it ask me for a password when I don't see any password in the key chain? What does the yellow key symbol mean?
    I really need to decrypt this document and their are a lot of programs that will decrypt a word document but you have to be running Windows and not OS X or 9.
    Can any one give me any suggestions on how I can decrypt this word document that was encrypted with Apple File Security.
    Thanks,
    DaisyMay

    Open Apple File Security and use it to decompress or decrypt the file. Any item can be encrypted with Apple File Security, and no other application will decrypt that format; the mechanism isn't the same as used in some Word versions. The Locked setting in the Get Info window controls something else. A password doesn't need to be stored in the keychain to be applied to an encrypted item; the file itself stores the encrypted password.
    (48403)

  • ITunes 9.2 XML file does NOT contain any iBooks information

    I have a little script that I have that generates a webpage to list what is in my iTunes library. I noticed that the XML file does not contain ANY information about iBooks or PDFs that you import. Any idea why that is? If my main library file gets corrupt, and I have to use the XML file to rebuild, I would lose all the iBook information....
    Seems like a oversight by the iTunes people

    why did Apple even make an XML file in the first place as initially most things in iTunes (following your logic) would be purchases from the iTunes store.
    Incorrect. The existence and use of iTunes significantly predates the existence of the iTunes Store. iTunes was initially designed to get its content from CDs. The XML file was for use by other apps such as iMovie or third-party apps to have access to the iTunes library so as to be able to locate tracks and playlists for use in the app.
    Anyway, I'm not interested in arguing with you about the matter.
    Apple, plus put iBooks stuff in the XML file!
    http://www.apple.com/feedback

  • Information about file Id, Logical file name and Physical file name

    Hi All,
    I am testing one program. Selection screen has 3 parameters, File Id, Logical File Name and Physical file name. In Physical File name, i am giving complete file name with path. But it is giving error. Please tell me, what is File id and what all information i need to enter for logical file name and physical file name.
    Thanks
    Puneet Aggarwal

    hi,
    try using this for filename.
    parameters : p_file like rlgrap-filename.
    Thanks,
    Gaurav

  • Security And Cryptography

    I'm so much new in Java Card programming and know alittle about security and cryptions in Javacards..
    Would u please help me to start learning in these topics from basic, or introduce any refrences that learns basic security and encrypt & decrypt
    thanks all..
    Kind Regards
    Hana

    This feature is often implemented using a secure channel.
    basically you have to authenticate with the card before being able to acess any data.
    pros:
    avoid internal encryption, which is costly
    allows to authenticate and encrypt the real important thing : communication. The card internals are secure by design: there are light/frequency/temperature sensors to protect from tampering.
    cons:
    i don't know :)
    how does it work? with a shared key and 3 ways handshake.
    (card contains a key that was loaded previously)
    1 host generates a random string H and sends it to the card.
    2 card generates a random string C and sends enc(H) and enc(C)
    host verifies that dec(enc(C))==C This way, we are sure the card knows the same key as us.
    3 host sends enc(H)
    card verifies that dec(enc(H))==H This way the card is sure the host knows the same key as it.
    access to data is granted only if all these steps passes.
    the crypto alg is generally 3DES with 16 bytes keys and 8 byte datablocks, this algo is managed in the card HARDware, so it's fast.
    this sort of process is used in global platform. Read this doc for more information, this is a bible.
    If you use the global platform mechanism, you will get excellent security with few code to write.
    Note that there are many possibilities here, this one is only an example to help you get the idea.

  • The file upload and download

    Hi all,
    I am going to build a form and run on the web. I am going to do a form which intend to do the file upload and download (any type of file). How can I achieve it?
    Also, once I put it on the web, I would like to do a 'web-like' function: when the user click on the file name, it can open it with the association with the browser (For instance, when I click on the *.doc file, it opens the word automatically). Is it poosible to do so and how to do so? Thanks first.
    Patrick

    Go to Utilities>more Utilities>upload/download is there.
    Amresh.

  • File vault and wake from sleep

    I had File Vault on ever since I got my Macbook Pro. It has always been slow to sleep and to wake from sleep -- sometimes taking 30 seconds. Then I turned File Vault and encryption of virtual memory off. Now the Macbook Pro wakes from sleep instantly. Can anyone explain what accounts for the difference?

    Hi, Daniel.
    You MacBook Pro employs Safe Sleep. An educated guess would be that using one or both of FileVault or Encrypted VM might incur an additional delay for encryption of the sleepimage file.
    Since it is easy to enable or disable Encrypted VM, try turning that back on and seeing if the delay returns. If so, that was the cause. If not, then it would FileVault.
    Good luck!
    Dr. Smoke
    Author: Troubleshooting Mac® OS X

  • An unknown excel file has appeared on my desktop. It cannot be deleted and I cannot get any information about it. Is this malware?  How can I get rid of it?

    An unknown excel file has appeared on my desktop. It cannot be deleted and I cannot get any information about it.
    Is this malware?  How can I get rid of it?

    Hello Jeff,
    Thanks very much for your reply.  I looked over the article you mentioned, but I have tried all of these methods, but only get the response "The item “29394D00” can’t be moved to the Trash because it can’t be deleted."  Similarly, I cannot Get Info on the file.  This is why I'm so concerned, it just appeared on my desktop, but I cannot touch it, or open it or delete it...
    If you have any more tricks up your sleeve, I'd love to hear about them...
    Derek

Maybe you are looking for