Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Is Free Encryption Worth It?
Is encryption worth the headache when using the public cloud?

While in constant debate over data encryption and ease of access, I encountered a train of thought that made my jaw drop. A tradeshow attendee suggested encrypting everything, but just use a weak algorithm; so as not to make it impossible to decode if needed in the future.

Before smirking and quoting statistics as truth, I stopped to ponder: was there any merit to the statement, what was the sensitivity level of the data, where was it being stored, who had access to it, what was the definition of a weak algorithm, was this archival data or was it accessed and changed often?

Through conversation, the premise was potentially plausible (with some big question marks), but the logic was still thoroughly flawed. Yes, the data was constantly changing and only updated records were being sent to branch offices via a public cloud file sharing service, but the data did contain personally identifiable information. The last time I checked, people do not change their social security numbers very often and data captured by an intruder will stay in its captured state.

The attendee’s second concern was that using ciphers based on strong algorithms, would cause a load on older hardware. I wondered if a breach cost more than updating old hardware, apparently not. A weak algorithm using a public or private cipher, translates to cracked passwords or credentials. The Enigma code kept the Allies busy for a while, but it was cracked; just like WEP, MD5, and earlier versions of SSL today.

A company knowingly cannot use ciphers that can be compromised as their font-line (in this case only line) of defense. If this person was concerned about product and server upgrade costs; use one of the free encryption applications that use strong and proven algorithms. Many applications and operating systems have open source cousins and so do many widely used encryption algorithms. Many of them are easier to use than a licensed copy and they have a small footprint.

The latest completely free encryption application I found and have begun using exclusively is based on the PGP algorithm, provides numerous options for cipher strength, and is fast and nimble. Another great thing about GoAnywhere OpenPGP Studio is that it runs on Mac OS X, Windows, and Linux.

Final analysis - If your company has chosen to “standardize on the cloud,” be safe and make sure anything you put up there is still yours when you pull it back down.

About Dirk Zwart
Born in Canada and calling Nebraska home, Dirk primarily writes on the Technical side of the IT realm. Having written for years at Gateway Computer and as part of other large IT organizations, Dirk happily writes for Linoma Software. When not writing children's stories or stage scripts, you'll find Dirk out back in the vegetable garden or building yet another server for reasons unknown. Follow Dirk on Twitter, Facebook, or LinkedIn.

Latest AJAXWorld RIA Stories
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our ...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In...
Technological progress can be expressed as layers of abstraction - higher layers are built on top of lower layers treating them as abstract black boxes with known interfaces. A serverless approach represents an inflection point that entirely separates the runtime layer from the u...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just ...
Big Switch's mission is to disrupt the status quo of networking with order of magnitude improvements in network e ciency, intelligence and agility by delivering Next-Generation Data Center Networking. We enable data center transformation and accelerate business velocity by delive...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021


SYS-CON Featured Whitepapers
Most Read This Week
ADS BY GOOGLE