This post is provided by Senior App Dev Manager, Chris Tjoumas who provides an overview of Always Encrypted with SQL Server 2016.Introduction
In this post, I want to focus on the Always Encr… Read More
This blog is part 2 of a series that covers relevant Azure fundamentals - concepts/terminology you need to know, in the context of Hadoop. Much off the content is a copy of Azure docum… Read More
WORK IN PROGRESS
This blog is part 3 of a series that covers relevant Azure fundamentals - concepts/terminology that you need to know, in the context of Hadoop. Much off the content… Read More
This blog is part 4 of a series that covers relevant Azure fundamentals - concepts/terminology you need to know, in the context of Hadoop. While the first three touched on Azure infras… Read More
Today we all give the internet for granted. That is not surprising, considering that over 3.5bln people are connected. Also, that number grows each second, faster and faster. Almost like a r… Read More
The Federal Government's use of a Security Tool that cracks down on Fake Emails has surged in recent weeks as Agencies with .gov Domains rush to meet a Deadline to Implement the Tool and Bol… Read More
Olá Pessoal tudo bem? Espero que sim!
Recentemente a Microsoft anunciou o Public Preview do Azure Database Migration Service (Azure DMS), uma nova forma de levar seus dados em… Read More
I am very excited to report that I have just deployed an isolated App Service Environment (ASE) in Azure Government. Here are a few quick pointers on how to get started.
Azure App Service En… Read More
Azure Functions is a platform for deploying serverless functions in a variety of different languages. It is easy to create APIs without having to worry about the underlying architecture and… Read More
Recently, I have across a scenario where the requirement is to fetch token from "IssuedToken*" active ADFS endpoints. Once application has the token from "IssuedToken*" endpoint, it would ha… Read More
I recently took the 70-533, Implementing Microsoft Azure Infrastructure Solutions exam. Each Microsoft exam page has a Skills Measured section. This section clearly outlines the knowledge th… Read More
Create a Jenkins server on an Azure Linux VM from the Azure portal has introduced how to configure a standalone Jenkins VM in azure based on Azure Marketplace image for Jenkins. This image i… Read More
In a previous blog post, I discussed that it is easy to set up a Kubernetes cluster in Azure Government (or Commercial) and deploy web applications to the cluster. The example deployment lag… Read More
Using SSL certificates with LetsEncrypt
On the following post we are going to explain how quickly and easy is to assign an SSL certificate to your Azure WebApp I have a WordPress WebApp alre… Read More
This is second part of the series on deploying Elasticsearch, Logstash and Kibana (ELK) to Azure Kubernetes Service cluster. In this article I am going to share steps needed to enable Azure… Read More
How to create a native app registration
This guide assumes that you already own an Azure Subscription, an Azure Active Directory properly setup and your PowerShell environment properly set f… Read More
If you haven't read part 1, you should do so before continuing here. Part 1 contains all the prerequisites you need in order to continue with this post.
Create your organization and your fir… Read More
Today, we are announcing .NET Core 3 Preview 1. It is the first public release of .NET Core 3. We have some exciting new features to share and would love your feedback. You can develop .NET… Read More
Our sixth AI reference architecture (on the Azure Architecture Center) comes from AzureCAT Mike Wasson.
Distributed training of deep learning models on Azure
Reference architectur… Read More
We all know about cryptocurrencies and the attention around has increased due to Facebook’s involvement with it. Due to such attention, many people are looking forward to being potent… Read More
BleepingComputer has released a report according to which a malware asking for a Bitcoin ransom is being circulated.
Not just scary, empty messages but can actually permanently encrypt file… Read More
Suppose you need to encrypt data between two peer-to-peer devices over an untrusted medium (i.e. the Internet), and you have an authenticated low-bandwidth channel that can be used to send a… Read More
Who better to learn about digital signatures from? Art by Kyume
Let’s talk about digital signature algorithms.
Digital signature algorithms are one of the coolest ideas to come o… Read More
Cybersecurity is the practice of protecting internet-connected devices, networks, and data from unauthorized access or criminal use. Due to the rise in cases of cybercrime, individuals and e… Read More
If you’re reading this wondering if you should stop using AES-GCM in some standard protocol (TLS 1.3), the short answer is “No, you’re fine”.
I specialize in secur… Read More
There are a lot of random topics I’ve wanted to write about since I started Dhole Moments, and for one reason or another, haven’t actually written about. I know from past experie… Read More
There seems to be a lot of interest among software developers in the various cryptographic building blocks (block ciphers, hash functions, etc.), and more specifically how they stack up agai… Read More
Earlier this week, NIST announced Round 3 of the Post-Quantum Cryptography project and published their rationale for selecting from the Round 2 candidates.
NIST did something clever this… Read More
If you’re ever tasked with implementing a cryptography feature–whether a high-level protocol or a low-level primitive–you will have to take special care to ensure you&rsquo… Read More
Since the IETF’s CFRG decided to recommend OPAQUE as a next-generation Password Authenticated Key Exchange, there has been a lot of buzz in the cryptography community about committing… Read More
Spyware written for educational institutions to flex their muscles of control over students and their families when learning from their home computer is still, categorically, spyware.
Dep… Read More
If you’re reading this, the chances are that you own a computer. If you own a computer, the odds of it running Microsoft Windows are very high. Windows has an 87.62% share of the deskt… Read More
The cryptography and information security experts who read my blog probably wonder from time to time, “Why furries though?” which I’ve spent ample time answering and hopefu… Read More
Governments are back on their anti-encryption bullshit again.
Between the U.S. Senate’s “EARN IT” Act, the E.U.’s slew of anti-encryption proposals, and Australia… Read More
Imagine you’re a software developer, and you need to authenticate users based on a username and password.
If you’re well-read on the industry standard best practices, you&rsqu… Read More
All websites need to be hosted somewhere. It is an area that can sometimes confuse people when they are buying their business a website. Many small businesses or sole traders know that getti… Read More
As we look upon the sunset of a remarkably tiresome year, I thought it would be appropriate to talk about cryptographic wear-out.
What is cryptographic wear-out?
It’s the thresho… Read More
A few years ago, when the IETF’s Crypto Forum Research Group was deeply entrenched in debates about elliptic curves for security (which eventually culminated in RFC 7748 and RFC 8032)… Read More
Cryptographers and cryptography engineers love to talk about the latest attacks and how to mitigate them. LadderLeak breaks ECDSA with less than 1 bit of nonce leakage? Raccoon attack brings… Read More
Cryptocurrency is popular lately because of Bitcoin’s price surge. Bitcoin is the most valuable ‘crypto’ nowadays, enticing investors to diversify their portfolio by invest… Read More
Cybersecurity has been one significant concern from the past decade, and the concern has grown in today’s date. Hackers, snoopers, and spies have found their way to target and get into… Read More
Previously on Dead Ends in Cryptanalysis, we talked about length-extension attacks and precisely why modern hash functions like SHA-3 and BLAKE2 aren’t susceptible.
The art and scie… Read More
The US Justice Department (DOJ) is Tightening its Oversight of Cryptocurrencies with the launch of Two New Enforcement Initiatives
The Move comes after the US suffered a slew of Ransomware… Read More
For the last few decades, the invention of new technologies and the internet have drastically changed how businesses carry out their operations. For instance, some processes that were initia… Read More
Converting an image from jpeg, gif, or png formats to pdf can be a real hassle. Most people have no knowledge of how to convert these images to pdf for their convenience. But don’t wor… Read More
“The Metaverse has now become a global trend. Jasmy is part of the blockchain in the digital world. Therefore, there is no reason not to enter the metaverse field.”
—&mdash… Read More
Did you know that, in the Furry Fandom, the most popular choice in species for one’s fursona is actually a hybrid?
Source: FurScience
Of course, we’re not talking about tha… Read More
If you can somehow avoid using RSA (i.e. using Elliptic Curve Cryptography instead), then don’t use RSA at all. Then you can skip this blog post entirely and all is right in the world… Read More
New York – TimesNewswire – Recently, QTKT is now listed on Nexxico.com as an initial coin offering (ICO), aimed to raise money from first to early investors, The token will… Read More
How to View and Delete Incognito History: Tips for Keeping Your Browser PrivateIncognito Mode is a great way to keep your browsing activities private. However, your information can still be… Read More
Minecraft is a video game that since 2009 has amassed millions of users, including many children, who by placing and destroying the blocks of the famous pixelated world learn to develop thei… Read More
How To Unblock Geo-Restricted Music-Streaming Website.If you are a music junkie, and you travel a lot, you surely have found yourself in a situation where all of your favorite music-streamin… Read More
If you follow me on Twitter, you probably already knew that I attended DEFCON 30 in Las Vegas.
If you were there in person, you probably also saw this particular nerd walking around:
T… Read More
Cryptographic agility is a vaguely defined property, but is commonly understood to mean, “Able to quickly swap between cryptographic primitives in response to new attacks.”
Wi… Read More
Victoria, Seychelles – QKEx is one of the best financial infrastructure service providers in the world. Recently, it officially launched various derivative products such as &ldquo… Read More
The unfortunate truth about the internet is that every time we use it, we run the risk of a cyberattack. This is particularly true in a post-pandemic world, as more people are opting to work… Read More
AWS vs Azure Cloud Security: Unveiling the Battle for Cyber Resilience
In the digital era, cloud security plays a paramount role in safeguarding sensitive data and mitigating cyber threats… Read More
This blog starts here at this initial post, with a tutorial for the installation of WordPress 6.3.2 on an Ubuntu 22.04 Server (AWS EC2 instance) with its database hosted on an AWS MySQL RDS… Read More
The focus of this article is on showing how to configure your WordPress installation to improve speed using the AWS CloudFront CDN and enhance security using AWS WAF. This builds on the earl… Read More