{"id":30341,"date":"2015-04-11T12:41:17","date_gmt":"2015-04-11T16:41:17","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-definition-computer.php"},"modified":"2015-04-11T12:41:17","modified_gmt":"2015-04-11T16:41:17","slug":"encryption-definition-computer","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-definition-computer.php","title":{"rendered":"Encryption Definition &#8211; Computer"},"content":{"rendered":"<p><p>    Encryption is the process of converting data to an unrecognizable or \"encrypted\"    form. It is commonly used to protect sensitive information so    that only authorized parties can view it. This includes    files and storage devices, as well as    data transferred over wireless networks and the Internet.  <\/p>\n<p>    You can encrypt a file, folder, or an entire volume using a file encryption utility    such as GnuPG or AxCrypt. Some file compression programs    like Stuffit Deluxe and 7-Zip can also encrypt files. Even    common programs like Adobe Acrobat and Intuit TurboTax allow    you to save password-protected files, which are saved in an    encrypted format.  <\/p>\n<p>    Encryption is also used to secure data sent over wireless    networks and the Internet. For example, many Wi-Fi networks are secured using    WEP or the much stronger WPA encryption. You must enter a password    (and sometimes a username)    connect to a secure Wi-Fi network, but once you are connected,    all the data sent between your device and the wireless router will be encrypted.  <\/p>\n<p>    Many websites and other    online services encrypt data transmissions using SSL. Any website that begins with    \"https:\/\/,\" for example, uses the HTTPS protocol, which encrypts all data    sent between the web server and your browser. SFTP, which is a    secure version of FTP, encrypts    all data transfers.  <\/p>\n<p>    There are many different types of encryption algorithms, but some of the most    common ones include AES (Advanced Encryption Standard), DES    (Data Encryption Standard), Blowfish, RSA, and DSA (Digital    Signature Algorithm). While most encryption methods are    sufficient for securing your personal data, if security is    extremely important, it is best to use a modern algorithm like    AES with 256-bit encryption.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/techterms.com\/definition\/encryption\" title=\"Encryption Definition - Computer\">Encryption Definition - Computer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Encryption is the process of converting data to an unrecognizable or \"encrypted\" form. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30341","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30341"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30341"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30341\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}