473,396 Members | 2,076 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

How to encrypt my website and databases on my VPSs using my own dictionary?

Hello!
I'm running two VPSs and both of them are under TOR. I already have good security and safety, but I think I need more.
Preferably, I'd like to put a secondary encryption using a technology/dictionary known only by me.
Like, how could I make this secondary encryption only in the databases without interfering with the LAMP packages?
Examples:
*turn "A" into a "ao101";
*turn "a" into a "ao201";
*turn "B" into a "ao102";
*turn "b" into a "ao202";
ETC.

And without interfering with the databases original content or with the user experience?

I really need this, since one of my TOR VPSs is a free email server, and I'd want to make this "TorMail" more secure, safe and privacy-friendly for the users.
Nov 2 '13 #1
2 7828
sicarie
4,677 Expert Mod 4TB
What database are you looking to encrypt?
Nov 6 '13 #2
bakertaylor28
45 32bit
You really shouldn't- rather, you should call one of the established open-source encryption libraries to do this, such as mcrypt /Libmcrypt, etc.

The reason why you shouldn't simply create your own cipher is because it is likely to be rather weak, and trivial to break. Also, extra encryption really won't help all that much, due to what are known as "Rainbow tables" and the like.
Feb 26 '21 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: NotGiven | last post by:
I am using SSL to go from one page to the next. Do I still need to excrypt session IDs? Thanks. srg at charlottenet dot com
2
by: Anilza Popat | last post by:
I would like to know how to encrypt and decrypt files using c#. I want a program that asks for password before encrypt or decrypt the file. best regards
6
by: Don | last post by:
Is there a way to send an encrypted email from server-side PHP, and then decrypt it using an email client such as Outlook? Thanks, Don ----== Posted via Newsfeeds.Com -...
1
by: Y Store Tools | last post by:
I've just started playing with mcrypt for encryption but not sure if I'll need to write my own. Basically I don't need anything advanced for protection but want to mask the data so it's not easily...
8
by: Papa.Coen | last post by:
After repeatedly calling/using a Dictionary I get a StackOverflowError. What am I doing wrong? The situation is as follows: I have ruler class, this class contains some member variables,...
0
by: sresh | last post by:
Hi All,, I want to create a Website in IIS using WMI through VB.NET programmatically..if anyone knew please help me..otherwise anyone can tell atleast which classes we have to use in VB.Net for...
21
by: hidrkannan | last post by:
aDict = {} aDict = 5 aDict = 'st' aDict = 12345 def outputMethod(**aDict): print aDict print aDict
6
by: GiJeet | last post by:
hello, I'm trying to use a dictionary as a class member. I want to use a property to get/set the key/value of the dictionary but I'm confused as how to use a dictionary as a property. Since there...
2
by: neovantage | last post by:
Hey, I want to connect to 2 different MYSQL databases at the same time. Does somebody help me out that how can i do that closing one connection and selecting other and vice versa...? kind...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.