Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 30 May 2013

Secure File Sharing Without Content Sharing

Posted on 08:34 by Unknown
Secure File Sharing Without Content Sharing
Img.Credit: freedigitalphotos
How often do you send emails, Word files or spreadsheets containing information that whilst not “top secret” it would be better that they were only accessed by your intended recipient? In the case of large file exchange or sharing this is normally achieved by uploading the file to a file sharing server and then letting the recipient know that it is there for them to download. Should we do more to protect these “shared files” from unauthorised access? Well in fact if these “file shares” are part and parcel to your companies business and contain any personal information you have a legal duty of care to ensure that their content is not revealed to the wider world.

Sending emails and files in “clear text” format is like sending your business letters on a post card. They can be intercepted and read by anyone who has the will to do so. Routinely our electronic ramblings are monitored by the various national security services at the very least.

So what can we do about it? We can obscure the content by means of encryption. By encrypting the content of an email or file we have effectively sealed it in an envelope. But surely this is going to be complicated and require the installation of software not only for me but also for my intended recipient, I hear you say. Well not necessarily. The new and emerging software solutions to this aged problem of providing robust encryption that everyone can use, simply without the need to understand all of the requisite complexities of random number generators, entropy and key pairs is proving that it is possible to bury these hitherto barriers within the program allowing a straightforward user interface to guide the user effortlessly through the maze in a couple of simple clicks.

If you will allow the pun, the “key” to this has been utilising a unique identifier for both sender and receiver. In this electronic age we all have such a thing, our email address! Imagine a system where a user’s email address is used in this way, the system can then generate key pairs associated with this address. These key pairs will be used to encrypt and decrypt any code the user may require protecting; emails, files, disks, thumb drives, CD-ROMs the list goes on. These encrypted portions of code can then be safely transported over any public or private network including the internet. They can even be stored on public servers awaiting collection by the recipient with the correct key/email address.

But how does the intended recipient’s email address work to decrypt the message? Easy because the data author or owner will know who they want to share that data with,so all that needs to happenis for the sender to supply the system with the email address of the intended recipient and it creates the necessary key pairs to enable encryption and decryption of the target code. These matching key pairs can be one-time pairs that will only apply to each data exchange further improving the security. Since each key pairing is only good for one exchange, if they were to be compromised it does not result in any future or past exchange being put at risk, clever!

This type of system can be used to encrypt emails, their attachments, files copied to disks, thumb drives, CD-ROMs in fact any media. Making use of a cloud based repository you instantly have the ability to transfer large encrypted files with users anywhere on the planet. Or if you prefer by hand via whatever storage medium you wish to use.

One such system Egress’s Switch even allows you to make these secure file transfers with user’s who are not subscribers to the system. This allows you to make secure exchanges with your trading partners or friends without the need for them to make any installation of software on their systems. Superb!
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Security Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ►  July (25)
    • ►  June (36)
    • ▼  May (56)
      • 5 Data Backup & Disaster Recovery Tips
      • Few Most Popular Online Bmx Games
      • The Best Concert Ticket Apps For Amazing Deals
      • Secure File Sharing Without Content Sharing
      • 4 Ways Technology Could Save Lives
      • Getting The Most Out Of Your Smart Phone
      • Your Life Is In That Computer. Back It Up Properly!
      • Here's Exactly How To Use Your Phone To Book Your ...
      • Pros And Cons Of IPhones
      • 5 Must Have Mobile Phone Apps For Your Job Interview
      • Cell Phone Tracking: Do You Need it?
      • Last Minute Tweaks To Your Computer
      • What The Changes In Google Panda Mean For Your Web...
      • Why Computers Recycling In Areas Should Be Done
      • Maintaining Your Computer So Your Computer Can Mai...
      • Windows Security Threats Now Hit Android Devices
      • Top 2 Apps For Flickr Users
      • Make Your Road-Trips Exciting With These Apps
      • 3 Great Facebook Alternatives
      • Why The Humble Inkjet Printer Will Not Be Complete...
      • Mobile Phones Apps Great For Keeping On Track Of G...
      • A Technology Comparison: Was This The iPod Of The ...
      • Social Media – Making Our World Even Smaller
      • Cloud Computing - What Do You Need To Know?
      • Cloud Safety: A Survival Guide
      • What To Keep In Mind When Buying A New Cell Phone ...
      • Spice Up Your Photos Using These Top 10 Photograph...
      • Top 7 Apps For Insurance Agents
      • Apps That Manage Your Inbox
      • Why Static Is Your Enemy When Building A Computer
      • A New Lease Of Life: Tuning Up An Ailing PC
      • Social Media: 5 Things You Didn't Know Your Employ...
      • Could Computers Ever Replace Schools?
      • Top Travel Apps For Android Mobile Phones
      • The Best Mobile Apps Of 2013
      • Here's Exactly How Your IPhone Can Save You Money ...
      • Social Media Places Greater Emphasis On Password S...
      • Types Of Cybercrime At Work In The World Today
      • The 10 Must Have IPhone And IPad Financial Apps
      • Saving Your Smart Phone When It Falls In The Toilet
      • 5 Apps Music Lovers Can Jam Out To
      • Google Glass: the Technology Breakthrough of 2013?
      • Top Puzzle Games for Your iPhone or iPad
      • How Can Playing Puzzle Games Help Boost Your Brain...
      • Choosing Good Home Theater Speakers
      • Best Scrabble Apps for iPhone
      • Top 5 Ways To Save Money On Your Cell Phone
      • Top 5 Android Apps For Soccer Fans
      • 3 Amazing Photo Editing And Sharing Apps
      • Best 5 Navigation Apps For IPhone
      • Being Smart For Used Smartphones
      • Laptop Screen Cleaning Tips
      • Top 10 Android Apps for 2013
      • Tips For Getting More Twitter Followers
      • Protecting Your Mobile Phone
      • Samsung Galaxy S3 (Root, Recovery and Custom ROMs):
    • ►  April (30)
    • ►  March (31)
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile