MUO

Encryption

Page 4

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
female engineer writing bash script on linux 1
How to Use Encrypted Passwords in Shell Scripts on Linux

Shell scripts can save you time and effort, but if you don't protect your passwords, they can be a liability. Here's how to stay safe.

By 
A Laptop Placed on a Table With Tablet and Book 1
What Is BBBW Malware? How to Remove It and Restore Your Data

Scammers utilize different types of malware to hold your data hostage. Here's what to do if you suddenly find BBBW files on your device.

By 
Image of binary codes in green 1
What Is a Message Digest?

How can you check if a message or any media content sent by a friend is genuine? Message digests could be the answer.

By 
A laptop with green code on the screen in a dark space 1
What Is Quantum-Proof Encryption and Why Can't You Test It Yet?

You might have heard about quantum computing; that can have serious implications on encryption techniques. So what can be done?

By 
gnupg keys in action on linux 1
How to Encrypt Sensitive Files Using GnuPG on Linux

If you've any personal or sensitive files stored on your Linux machine, you should consider encrypting them with GnuPG for added security.

By 
 1
3 Ways You Can Secure Your PC's UEFI/BIOS

Your PC's hard drive contains a lot of sensitive information. Here are a few ways you can protect it by securing your BIOS.

By 
media sharing plex image 1
How to Make Your Plex Server More Secure Using a Simple Domain Name

If you run a Plex media server, your connection might not be secure from hackers. Fortunately, it's very simple and cheap to fix this problem.

By 
Skiff email open on computer 1
What Is Skiff? Everything You Need to Know About the Encrypted Email and Drive Platform

Skiff is an encrypted email platform that comes packed with a drive suite. It also boasts crypto wallet support. Here's everything you need to know.

By 
XMPP OMEMO smartphones chats logos 1
What Is OMEMO End-to-End Encryption? Chat Privately Using XMPP

XMPP is a long-running instant messaging protocol, but it's not a particularly private platform. So how can you encrypt messages when using XMPP?

By 
secure Windows 10 1
How to Encrypt a Windows 10 Folder Using BitLocker

When you have sensitive files on your computer, you should protect them from unauthorized access. Here's how you can do so with BitLocker.

By 
Image of code on a screen 1
How to Set Up Military-Grade Encryption on Windows 11

AES encryption is touted as "military-grade," and for good reason. Here's how to encrypt your data on Windows 11 with a highly secure standard.

By 
Padlock on a laptop keyboard to represent file encryption 1
What Is Steganography and How Does It Work?

You can hide secret messages in plain sight. But how? Here's what you need to know about the cryptography technique called steganography.

By 
password-protect-folders 1
How to Password Protect a Folder in Windows

Need to keep a Windows folder private? Here are a few methods you can use to password protect your files on a Windows 10 PC.

By 
hard drive plugged into a laptop 1
How to Enable Auto-Unlock for BitLocker Drives

There's no need to manually unlock your BitLocker drives every time you want to use them. Here's how to set them to automatically unlock on your PC.

By 
person connecting to remote servers using SSH 1
Everything You Need to Know About the Twofish Encryption Algorithm

Many believe Twofish is more secure than AES, the most popular encryption algorithm in the world.

By 
Samsung T3 SSD on a MacBook 1
Hard Drive
How to Password Protect an External SSD

Looking to password protect your solid-state drive? Here are the best ways to secure your external SSD device.

By 
what are encrypted messaging apps 1
The 8 Best End-to-End Encrypted Cloud Storage Providers

Looking for a cloud storage service/ Make sure your data is secure with a provider that encrypts all your private information.

By 
Image of code on a laptop for encryption  1
What Is AES-256 Encryption? How Does It Work?

It's often touted as the most secure form of encryption, but how does AES-256 protect your privacy?

By 
common-encryption-types 1
5 Common Encryption Types and Why You Shouldn't Make Your Own

Is it a good idea roll your own encryption algorithm? Ever wonder what types of encryption are the most common? Let's find out.

By 
Image of code on a screen 1
Symmetric vs. Asymmetric Encryption: What Are the Differences?

Did you know that there are two ways you can encrypt your information? This is what they are and their differences.

By 
2 3 4 5 6
Page 4 / 17