Simple Steps to Data Encryption
by Zeljka Zorz - Thursday, 22 August 2013.
Author: Peter Loshin
Pages: 86
Publisher: Syngress
ISBN: 0124114830



Introduction

After last week's Practical Anonymity, here is another book by Peter Loshin that you might need in this new world of ours. It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications.

About the author

Peter Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including Computerworld, PC Magazine, Internet.com, and CNN.

Inside the book

From the very introduction, the author begins to teach. Here he is, talking to the reader about his or her motivation behind picking up the book, and a page later he has already explained - very simply and clearly - how to encrypt, decrypt, and verify a digitally signed file.

He continues in the same vein: explains the basic cryptography functions, advises on the OS you should use, and so on. By his own admission, he started writing a comprehensive book about cryptography and became bored, so he decided to write a short fictional story about a random guy (Bob) who lives in the dictator-run tiny state of Sylvania (also fictional), and wants to keep his dissident thoughts and writings out of the hands of the authorities.

He is aided by Sam, a guy who's sitting next to him at the airport and "just happens to know all about GnuPG." The entire book is written in the form of a one-on-one lesson between Bob and Sam and is interspersed with explanations about different concepts and practical instructions from the author (well, it's all written by the author, but you know what I mean).

Final thoughts

If you wan't to learn how cryptography works, this is not a book for you. If you want to learn how to encrypt, decrypt, and digitally sign your data, how to create public and private keys, how (and why) to revoke them, public key functions, as well as useful security practices such as verifying data downloads, choosing good passphrases and how to encrypt a disk or your system hard drive, you will love it.

The book is extremely short, but for a good reason - it never strays far from the practical lessons. It does, however, contain many links to additional resources, should you want to improve your knowledge.



Spotlight

Hackers indicted for stealing Apache helicopter training software

Posted on 1 October 2014.  |  Members of a computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the US Army and stealing more than $100 million in intellectual property and other proprietary data.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //