Back to Overview

Chapter 5: Forensics on Headerless encrypted Files

The chapter explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile.

- You can maximize the video by clicking on the maximize button in the video controls -

Chapters

Back to Overview

NumberTitleSummary
1Introduction to Encryption and File-encryptionThe chapter gives a short introduction to the terminology and the background of encryption in general. It also provides the important characteristics of encryption on the file-system level.
2 CrococryptFile Windows InstallationThe chapter contains how to download and install CrococryptFile on Windows and provides a basic overview about the installed components.
3 Password-based Encryption, Decryption and WebDecryptThe chapter demonstrates how to use the password-based encryption capabilities of the CrococryptFile open-source application family.
4 Token-based Encryption with Windows Keystore and OpenPGPThe chapter demonstrates how to use tokens to encrypt file archives with CrococryptFile.
5 Forensics on Headerless encrypted FilesThe chapter explains the forensics regarding privacy issues of encrypted file archives and demonstrates the usage of headerless files with CrococryptFile.
6Linux, Unix and Command-line usageThe chapter demonstrates the *ix user interface (UI) of CrococryptFile and the command-line interface for server and scripting purposes.
Course Assessment Questionnaire This assessment questionnaire gives you the opportunity to verifiy your learning progress.