SlideShare uma empresa Scribd logo
1 de 60
Encryption for Everyone:
What We Do Is Secret
Dru Streicher
Dru Streicher
•Systems Administrator ()
•Hardware Hacker
•Open Source Punk Rocker
•Collector of Arcane Technology
& Vinyl Records
About Me
Encryption Basics
Encryption: What Is It for?
Why Is Encryption Important?
What Does It Look Like?
Encryption is Hard!
One Way Functions
• Phonebook encryption
• Plaintext: S-E-C-R-E-T
• S = Jenny Smith 867-5309
• Cypher text then becomes 6 phone numbers
• To decrypt you would have to find each phone
number in the phone book
• Easy to make & Hard to solve
One Way Functions
HTTP vs HTTPS
HTTP vs. HTTPS
HTTP vs. HTTPS
HTTPS
Meet Alice & Bob
Alice wants to share a secret
message with Bob
They don't want Eve to be able to
get their secret message
They Use Symmetrical
Encryption:
Alice encrypts the message with a
password and sends it to Bob
Even if Eve intercepts the
message, without the password it
can't be decrypted
Bob knows the password so he
can decrypt the message
Real world use for
symmetric encryption:
Disk Encryption
Disk Encryption
• There are ways to access your drive
and get around all that logging in stuff
• Encryption makes it private
Tools for disk encryption In linux
Asymmetrical Encryption
Alice and Bob have never met:
They use Asymmetrical
Encryption
Public vs. Private Keys
Alice and Bob trade public keys
Alice encrypts her secret message
using Bob's public key
Bob can then use his private
key to decrypt the message
Key Servers
Creating Keys Using
the Command Line
If you lose your private key's password or your private key
becomes compromised you can revoke the key.
Revocation Certificate
Creating a Revocation
Certificate
Thunderbird & Enigmail:
Your one stop for PGP & Email
• Walk you through creating a gpg key in wizard mode.
• Manage all your keys
• Encrypt and Decrypt mail Automagically
• Sign outgoing email with your public key
Web Based Email
Gmail and Yahoo and other web based email providers
don't support encryption and decryption natively.
• The Onion Router
• “Tor directs Internet traffic through a free, worldwide
volunteer network consisting of more than three
thousand relays to conceal a user's location or usage
from anyone conducting network surveillance or
traffic analysis.” -Wikipedia
How Tor Works
How Tor Works
How Tor Works
Tor Software
• Exit nodes can be monitored
• Can be hard to configure
• Speed
Problems With Tor
• Virtual Private Network
• Creates an encrypted point-to-point network
• Allows you to remotely access your local network
resources such as printers, servers, computers
VPN
VPN
Software VPN Options
Hardware VPN Options
• Lifehacker.com: How To
• Raspberry Pi
• Your Home Router:
• DD-WRT
• Tomato Router
• IM – Off The Record (OTR) plugin for Pidgin
• Android – K9
• SMS Encryption – TextSecure for Android
Other Encryption Tools
Encryption is About Privacy
More Info
Web
Beginners Guide
- Steven Levy
The Codebreakers - Dav
Questions?
Thanks
• Ohio Linux Fest
• Ian Gillespie for the great slides
Contact Me
/+vmbSPAXusa70ehbxvzBry/92HSL46yA+S7v7aCYT67mVVTvIgIBOwlgC1ektlCHmBJiCxi
n9BsjE1cNRMp2USjb+sIH1Qt2Ix9EnCTR9hsKuvCe9u5teh/kleOYr2Cz0eogqVephMvC5bf
EK/b1pEUhx6Z+T/pAd3E8dh1nF0Kvo2IgB+Lb5qLFlqZxVT/oLOnGT7kpChwhP/J9/71c7KY
emXF0hjnsKeE8CNUNBsEvASmFcOdEHJ8Iyu0kHRsWp2HqjphmbN8ozg4ykvtjIvu6dGOskO+
qs30LxNqpRXb2xUf1j8IXQulh6Di6IGRmKo20dw1PSBKOSrsUgretUThFJ2x/iIDbc3Boemi
82IHCh0Jhjr5S6u4FmpeRHZMwMIpON0p8OcWTL5iabUih0EWQwARAQABtDZEcnUgU3RyZWlj
aGVyIChIdXJyaWNhbmUgTGFicykgPGRydUBodXJyaWNhbmVsYWJzLmNvbT6JAjgEEwECACIF
AlDCGlACGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEMtLKJM5q6CK29gQAKI3J3XE
t7eauBegHnc7iTZBjQAWym4B+QzAv1qipVU49nEip4qPlPkCOg8gCE2xCaq3yfRYJm/MTuxp
u2GTjfGtkUgqw3eAJs42pRK7eDJKNUZVZ799yy+nYtv8pBMqQqFS2YyTSczee7sx7vmFp6J+
zKp+e7ePF/a+V3ZVXrnAGwSyn0iuXUP/asOl89n979dp+fYmV26GzBlyz7qfCbWwNy5028Mj
tHdahzUhZ3Utr3RuQ8MIcdbZsJSoEGE6aOrg2/YH8LzDTxpoUjvL+lE2dM183VAh03Hm41Ab
ma6z1Bt96xcQ4bmINAL/Z/NqrjXwpOk+JAY6GlgKP+KT0vE9DZbfXYGZZNehwV4gVKSHOuZY
FB/MvmExc6JgXl8oUir92IyX1Ol+FIjZGJnq9YVDAFyw88XNwdofuw52SbBkeD8bJWkAbiSh
IpERgclY23y48bPI0b/RQnH9DFjY0QIDaNtVUOIgSd8GEAdMWs9a2xAV2PVfZfvtgNh2D7Lf
L9tmF9HYSXMfypy4NyQfsKhMgXr/vxWDpPNWWmJZW5JpXBZDvEifXlBeeOG72LXpr/9i4R3i
Gmqs34cJwYjmf1eaw8kcFmLyqJgIsk7e7zn1YctFSCQfbXYgtua9LBrObsejZ6XGrLHLUVs4
krPRG/XFsR0rbUrLVeTme3mTVRlKuQINBFDCGlABEADXta7G0ydqI5hBcaLJ6YxfB3EcE2Jv
yFx9TLn1FFQIfJniKpSiiQLVZoaV7XOEhYfqx9b2mHSlpovStM99gXMFeSzYKcsc87XpiVSh
SBdevTJcRqqZ56zZjyMDz6Mo3mQrGnGL/pptV9BxZ6hZJRgiD0s9Oy7rK+s2r2b6zlu6RQWf
Rt9hNqIWU3qDdSaEi2lbzd6HcWa7VS8JKebC3lnMGJM3Mfubpl/WR9UcuRTnXygL9yhzOyMH
F7+3SulaLf8ATgEOLyXKf/NFe7IBHJEmUGr18CkyTw2NTfP802LXk7SuUk3hn2lnwL0HFNkK
EwKMH3fsmYsoSnjCtIA1sFfdsdGiAXfyazTYdoUGOdn0blE+rDuwFF2Y0FAjXAljWt6WkT5u
+6jFR5fDSVCm6ug/ZHeHUobWR55/2vHyAmCaf0v9XIJBo+PCEDyuPYbSRu3z3SOSN6+y2PK1

Mais conteúdo relacionado

Mais procurados

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noidaDSC Delhi
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Thoughtworks
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentationdrewz lin
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalistsJillian York
 

Mais procurados (8)

Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Weaponization of IoT
Weaponization of IoTWeaponization of IoT
Weaponization of IoT
 
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Virtualisasi Hacking
Virtualisasi HackingVirtualisasi Hacking
Virtualisasi Hacking
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 

Destaque

Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsJohn Congdon
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsYury Chemerkin
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationGovindarrajan NV
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryptionVenkatesh Kariappa
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 

Destaque (12)

Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Gregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocolsGregor kopf , bernhard brehm. deniability in messaging protocols
Gregor kopf , bernhard brehm. deniability in messaging protocols
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Internet security
Internet securityInternet security
Internet security
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Semelhante a Encryption for Everyone

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 CertificatesGabriella Davis
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
20 security
20 security20 security
20 securityabiy2004
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHAndrew Morris
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communicationsdefconmoscow
 
encryption
encryptionencryption
encryptions1170037
 
Encryption
EncryptionEncryption
Encryptions1170037
 

Semelhante a Encryption for Everyone (20)

enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Fun With SHA2 Certificates
Fun With SHA2 CertificatesFun With SHA2 Certificates
Fun With SHA2 Certificates
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
20 security
20 security20 security
20 security
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Shmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSHShmoocon Epilogue 2013 - Ruining security models with SSH
Shmoocon Epilogue 2013 - Ruining security models with SSH
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communications
 
Internet security
Internet securityInternet security
Internet security
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Cryptography
CryptographyCryptography
Cryptography
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
Amazon
AmazonAmazon
Amazon
 
encryption
encryptionencryption
encryption
 
Encryption
EncryptionEncryption
Encryption
 
Amazon
AmazonAmazon
Amazon
 

Mais de Coastal Pet Products, Inc. (13)

Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
IT Security in 2014
IT Security in 2014IT Security in 2014
IT Security in 2014
 
Printer Security
Printer SecurityPrinter Security
Printer Security
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Using Big Data for Security Alerting
Using Big Data for Security Alerting Using Big Data for Security Alerting
Using Big Data for Security Alerting
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
Sounds of Security
Sounds of SecuritySounds of Security
Sounds of Security
 
Beyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise SecurityBeyond The Splunk App for Enterprise Security
Beyond The Splunk App for Enterprise Security
 
Attacking and Defending Full Disk Encryption
Attacking and Defending Full Disk EncryptionAttacking and Defending Full Disk Encryption
Attacking and Defending Full Disk Encryption
 
Competitive Cyber Security
Competitive Cyber SecurityCompetitive Cyber Security
Competitive Cyber Security
 
Forensics for the Defense
Forensics for the DefenseForensics for the Defense
Forensics for the Defense
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Cloud Security: Ten Things
Cloud Security: Ten ThingsCloud Security: Ten Things
Cloud Security: Ten Things
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Encryption for Everyone