Friday 22 April 2016

SECURE YOUR FILE USING AxCrypt

This tools help encrypt the file to secure the confidentially and integrity of the file from unauthorized person.

STEP 1 :  Choose any confidential file to encrypt. AxCrypt also can encrypt many file at the same time if the files are in the same folder.

STEP 2 : Right click on the file or folder that want to encrypt > select AxCrypt from the menu > select Encrypt to encrypt those selected file/folder.

1.png


STEP 3 : Create a passphrase to secure the file. Try create a strong passphrase by creating a long and mix with symbols, number, capital letters and etc. The stronger the passphrase, the stronger the encryption.


2.png


STEP 4 : After the encryption, the file icon will change to the AxCrypt shield. It also will change the file extension to .axx.


3.png

STEP 5 : When you try to open the encrypted file, it will ask you the passphrase. So you need to remember the passphrase to use the file again. After you edit the file, it will automatically encrypt the changes. Do not tick the check box says “Remember this decryption” so that only an authorized person that have the passphrase only can open the file.


# If you no longer want to keep this file as an encrypted file, right-click on the file and select Decrypt at the menu so it will permanently change it back to normal file.


4.png

Sunday 17 April 2016

MD5 HASH

APPLICATION : IgorWare Hasher

STEP 1 . CREATE FILE.TXT IN NEW FOLDER
STEP 2 . OPEN APPLICATION TOOL
STEP 3 . CLICK BROWSE BUTTON TO OPEN FILE.TXT

STEP 4 . CHOOSE FILE.TXT
STEP 5 . CLICK CALCULATE BUTTON TO SHOW THE RESULT
STEP 6 . CLICK SAVE BUTTON TO SAVE FILE.TXT TO MD5
STEP 7 . OPEN MD5 FILE
Read the page


WHAT IS MD5 HASH

MD5 which stands for Message Digest algorithm 5 is a widely used cryptographic hash.The idea behind this algorithm is to take up a random data (text or binary) as an input and generate a fixed size “hash value” as the output. The input data can be of any size or length, but the output “hash value” size is always fixed. Here is an example of MD5 Hash function at work:









REFERENCE

http://www.md5.net/