In the lexicon or glossary explains abylonsoft topics of general interest around the offered software products, computers and technology. The column with the letter P contains 12 entries, like for example Peter Gutman Method.
The abbreviation PGP stands for Pretty Good Privacy and means "Pretty good privacy. Originally developed in 1991 by Phil Zimmermann, the program offers the possibility to encrypt and sign files using public key methods. The software from abylonsoft also supports certificate-based encryption, but uses the X.509 standard according to PKCS..
PKCS (Ppublic Key Crypto Standards) is a set of different standards for asymmetric encryption (Public-Key Cryptography) according to X.509 developed by Appel, DEc, Lotus, Microsoft, MIT, RSA and SUN. They include specific and independent implementation standards, specifications and others that are monitored by RSA Data Security Inc. Specifically, PKCS#7 describes the standard for the public key and PKCS#12 describes the standard for the certificate (private key, private key, file extensions e.g. *.pfx, *.p12).
The elements of the PKCS standard include the digital certificate, the Certification Body (CA), the Registration Authority (RA), the Certificate revocation list (CRL), the Directory service (LDAP) and the Validation service (VA).
A Password, Password or Personal Identification Number (PIN) is used for unique identification. Only those in possession of the correct secret key can identify or authenticate themselves as authorized persons. This gives a person access or access to a protected area. This includes, for example, the password or access PIN when entering a room, as well as the password for symmetrical encryption or login. As long as the password remains secret, security is guaranteed. Therefore, a password should be easy to remember and still have a certain complexity and length. Currently, a password of 12 characters is considered secure. However, the longer the password, the more secure it is. In addition, no simple password such as "My Name" or "123456" should be used, which are published annually in "Top-Lists" (Geman language). A good password consists of capital and small letters combined with numbers and special characters. Also, the same password should not be used for all services. To remember passwords, you can build a bridge by using only the initial letters of a sentence that is easy to remember, replacing or supplementing individual characters with numbers and special characters. Alternatively you can use a password safe on your PC, like the abylon KEYSAFE.
The anti-keylogger function password scrambler 3 and the image input 2 increase security against spying out passwords.
password scrambler random characters are sent to the password field at irregular intervals and are also deleted again.
image input the characters are not entered via the keyboard, but selected with the mouse. These are sequences of characters. With the combination of these two functions, password entry is much safer and malicious software (e.g. keylogger) is at a disadvantage.
The Peter Gutman method is a very secure method for erasing data from magnetic media. The data is overwritten 35 times in the following order: 4x Random, 0x55, 0xAA, 0x92, 0x49, 0x24, 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xAA, 0xBB, 0xAA, 0xCC, 0xDDD, 0xEE, 0xFF0x92, 0x49, 0x24, 4x Random. This method is used by the software of abylonsoft as Shredder-Level 5. For detailed information on the
Privacy is a statutory right to an area where a person is unobserved. This is laid down in Article 8 of the European Convention on Human Rights (ECHR) and in the German Basic Law (Article 2 (1) in conjunction with Article 1 (1) of the Basic Law). Examples of this are also postal and telecommunications secrecy (Article 10 G) and the inviolability of the home (Article 13 GG). The exceptions to this fundamental right to privacy have also been enshrined in the Basic Law since 1998 (Article 13, paragraphs 3 to 6 of the Basic Law). Acoustic and optical surveillance of the home and telecommunications media is only permitted to law enforcement authorities and intelligence services for criminal prosecution under strict conditions. This balancing act between conflicting fundamental rights is a constant source of controversy. A major problem here is that weak points are exploited and interfaces created (e.g. State Trojans), the use of which is difficult to keep secret and secure.
Examples of our software products that can help protect personal privacy:
The private key is the secret key (Private Key, PKCS#12) that must not be passed on under any circumstances. The private key is used to sign (sign) and decrypt data. It is entered on the computer in the Windows system certificate database and has the extension *.p12 or *.pfx as a file. It should always remain private and should never be given out of hand.
A password or key is required for encryption. This should always remain a secret so that strangers cannot access the protected data. In the case of asymmetric encryption, the secret key is the part of the certificate that must not fall into the hands of others. This is also known as the "private key" and enables asymmetric encryption or the signature of data.
On the computer the processor executes the processes of a program and handles information and commands. Under Windows, a process is called a task. However, this is only a rough description, because a task can also combine several processes. All currently running tasks are displayed in Windows Task Manager. When the operating system is executed, numerous processes are executed in parallel, either by the operating system itself or by various applications. The number can quickly reach 100 and more. Also in the software abylon APP-BLOCKER all current and past processes are listed. The output still distinguishes between processes in the context of the currently logged on user (User) and processes in other context (AllUser). In addition, extended information is displayed for each process.
Processor chip cards are also called smartcards and contain a complete computer consisting of processor, ROM (EEPROM, EPROM) and RAM. In addition to hard-wired functions, freely programmable backup functions are also possible. In particular, challenge-response protocols and crypto procedures can be implemented on the card. For example, your cash card or mobile phone card is a processor chip card. Smartcards are far more complicated than memory cards because they basically have all the components of a computer. These cards usually also contain a cryptochip, which can be used for encryption and authentication. For these operations, the secret key does not have to leave the smart card, which makes it very secure.
see also: Chip cards
The public key (PKCS#7) must be passed on (Public Key Exchange) or stored in a database (PKI - Public Key Infrastructure).
The Public Key is used for asymmetric encryption. As the name implies, this key can be passed on or made public, e.g. via an LDAP directory. With the public key files can be encrypted, but not decrypted. Data encrypted with a public key can only be decrypted with the corresponding private key. The public-key is also used to verify a signed file.
Please use our support form for support requests Support form!