Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "encryption at rest"
-
*me, coding at a pub*
*random dude walks up to me*
He: "what are you doing? Programming? What?"
Me: "yup. That's a horizontally and vertically scalable webservice, that's using amqp, rest APIs and encryption to schedule starting, stopping and autoscaling of a total of 90 heroku applications. This webinterface *showing* allows you to trigger starts and stops manually and monitor all processes."
He: "oh, so you are programming a Website? In HTML?"
Me: "euhm........ Yes."
I understand this dude had probably no clue what I was talking about.. Yet I am angry at him. Reducing more than 12k loc to HTML... Go fuck yourself.22 -
I need to encrypt some large files at rest and then decrypt them immediately prior to processing.
App and files are on a Linux system (CentOS). App is in C. Machine is controlled by a third party.
What encryption libraries would you recommend? And, is there any clever way of managing the decryption key beyond compiling it in the code and doing some basic obfuscation?
Are they fancy obfuscation libraries out there, for example?
And, the reason I'm not going to SO (well, one reason) is that I don't want to have 50 answers that tell me that's it's impossible to 100% protect data on a machine you don't control. This I understand---just looking for "best effort" solution.7 -
Had a Nas with a single 3tb seagate HDD in it.
It ran well for half a year and it was my main backup and a time machine for my dad.
The time came that my budget was allowing a second drive for redundancy so I powered it off, added the second drive and powered it back on.
😐😓😧😭
The drive did indeed die and yes, it was one of those drives with an extremely high failure rate.
My dad was pretty mad that his backups were gone even though he didn't need them.
So my biggest lesson from this was to always encrypt such drives because dads backup wasn't and my files and such weren't either, so someone could restore our hole life's from the drive.
So I can't Rma that fucker.
Zfs at rest encryption ftw!
By the way, writing this I noticed that I didn't need to power the Nas down to add the second drive....
Ffffffffuuuuuuuuucccckkkkkk.
Another more recent thing was a refurb 4tb we red that I bought used for a bargain.
It reported 2 unwritable sectors but I didn't care for the money.
After about a month, it died.
The interesting part is how it died.
It spinns up, gets detected, you can access the data.
You can copy the data.
But after a few moments of continues load, all operations start timing out and the drive either disconnects completely or the zpool degrades and shuts down.
In the first case, replugging brings the drive back untill it does it again.
On zpool degradation only a reboot brings it back.
Put a fan on it in case it was overheating but that didn't fix it.4 -
The crypto market is flooded with web recovery solutions, each claiming to be the best thing since sliced bread. But how do you separate the wizards from the mere mortals? A comparative analysis of various web recovery solutions can help you make an informed decision. It's like conducting a thorough background check on potential roommates—except this time, it's your digital wealth that's at stake. Infinix Web Recovery is aware of how critical it is to stay one step ahead in the dynamic world of cryptocurrencies. Their platform has alarm and monitoring mechanisms that operate in real-time because of this. This enables you to respond quickly to safeguard your assets by identifying any unusual activity or possible threats. You won't have to worry about waking up to discover that your cryptocurrency holdings have vanished for no apparent reason. Credentials are no longer the only means of authentication. Infinix Web Recovery effective user authentication procedures raise the bar for security. You can be guaranteed that only authorized users have access to your cryptocurrency holdings thanks to features like multi-factor authentication and biometric verification. You can stop worrying about having weak passwords and becoming a target of phishing efforts. Infinix Web Recovery knows that your crypto assets are valuable and deserve the highest level of protection. That's why they employ advanced data encryption and secure storage methods. Your sensitive information is transformed into a secret code that's virtually impossible to crack. Rest easy knowing that even if someone gains access to your data, it will be completely useless to them. It's like keeping your crypto stash in a safe within a safe. Crypto asset management is an ongoing process, and so is utilizing Infinix Web Recovery . It's important to regularly update and review your recovery settings to keep up with the ever-changing crypto landscape. Stay proactive and ensure your recovery protocols are up to par, so you can always be one step ahead of potential threats. In the world of cryptocurrencies, where threats and risks lurk in the shadows, it's crucial to have a powerful ally like Infinix Web Recovery . With their real-time monitoring, efficient authentication processes, and secure storage, you can rest easy knowing your assets are protected. The success stories of Jane and John showcase the remarkable capabilities of Infinix Web Recovery in recovering lost funds and preventing hacks. Contact Infinix Web Recovery2
