Add Encrypt And Decrypt Options To The Shortcut Menu In Vista

When you want to encrypt or decrypt a folder in Windows Vista, right-click the folder and select Properties from the shortcut menu. From the Properties window, click the Advanced button on the General tab and select the Encrypt or Decrypt option. If you frequently encrypt and decrypt folders, you can add these options to a folder’s shortcut menu.

  1. Open the Registry Editor.
  2. Navigate to the following: HKEY_Current_User Software Microsoft Windows CurrentVersion Explorer Advanced.
  3. Create a new DWORD and name it EncryptionContextMenu.
  4. Set the value to 1.
  5. Close the Registry Editor.

[awsbullet:windows vista dummies]

Add Encrypt And Decrypt Options To The Shortcut Menu In Vista

When you want to encrypt or decrypt a folder in Windows Vista, right-click the folder and select Properties from the shortcut menu. From the Properties window, click the Advanced button on the General tab and select the Encrypt or Decrypt option. If you frequently encrypt and decrypt folders, you can add these options to a folder’s shortcut menu.

  1. Open the Registry Editor.
  2. Navigate to the following: HKEY_Current_User Software Microsoft Windows CurrentVersion Explorer Advanced.
  3. Create a new DWORD and name it EncryptionContextMenu.
  4. Set the value to 1.
  5. Close the Registry Editor.

VoIP SSH [Secure SHell]

The animated TECHTip Tutorial is available here.

The following series of TECHTips will review the NIST Report on VoIP and its recommendations. The first NIST recommendation is: Develop appropriate network architecture. TECHtionary analysis is to Require IPSec or SSH [Secure SHell] if remote access is allowed and encryption wherever feasible.

This is intended to be an introduction to SSH, not an in-depth analysis of the topic presented. One of the key points of SSH is that the connection is established and encrypted (passwords are not passed between devices in plain text) before a user is possible. SSH keys are asymmetric or symmetric. Symmetric keys are used for the session and same (symmetric) key is used to encrypt and decrypt. That is, symmetric keys are derived (created) from one another. Asymmetric uses pairs of Public and Private keys. Rules are:
Continue reading “VoIP SSH [Secure SHell]”