Relies on how many individuals shall have entry. If many individuals shall have entry, take a cloud service. For those who solely need to copy it upon getting two methods to do it.

First is essentially the most safe method, you copy it over ssh by scp or rsync over a OpenSSH protected line. My very own knowledge isn’t in a cloud however I entry it over a VPN and an SSH service. It’s sufficiently protected that method, so if somebody breaks the VPN he nonetheless has to interrupt the login to the server and so I don’t fear an excessive amount of about security.

The second solution to do it, is to open a unsecured internet service on the web, like a typical HTTPD service with no safety in any respect, however solely entry to at least one listing, you encrypt your file in a safe method, like AES256 or higher with a password of adequate energy, put it in there, name your consumer or good friend over a second, safe channel, give him the http deal with the place he can obtain it. Let him obtain it and relying on which type of channel you contacted him or not you first test, if there solely has been one obtain of that file, if it’s the case you possibly can transmit to him the password.

It’s not completely protected that method, if somebody is between you and the consumer and has entry to all of your (hopefully) secured channels, but when that’s the case you’re fucked in any case.

And you probably did errors on such an epic degree, that safety can solely be a mock of it.

See also  Inno Setup Usage

Often these two strategies I think about safe.

Don’t put a Home windows service like SAMBA or something Home windows-like on the web. Simply don’t.

It will get pounded throughout the first ten seconds it has contact with it. A minimum of that was the time an unpatched Home windows 95 wanted to go down when MS BLASTER32.EXE hit the world and it has not gotten any higher since then.

So, we discovered for that point, that you just by no means put a service on a Home windows field, this field will get hacked and you may’t do something to forestall it. It is just a matter of time. And that additionally means you possibly can’t actually do this with a superb consciousness so long as your providers are on a Home windows field.

My recommendation is: don’t do it. There will probably be folks telling you, that you may, however they’re fallacious. It’s actually harmful. Don’t do it. The one factor you possibly can open a port with the web is a properly setup Linux field and Home windows solely over a VPN, so no one else has entry, and your VPN you shouldn’t launch from a Home windows field, too.

There are bugs within the IP stack that, I suppose are nonetheless unfixed and your machine will get pounded whether it is accessible by unauthorized entry from wherever. You want a VPN and with {that a} Linux field or router to do this.

In case you are on Home windows, you haven’t any Linux field and no router and no VPN, then your solely method is to make use of a cloud, when you can neglect Dropbox for that, final time I checked, they solely permit 2GB information tops. You’ll be able to after all cut up the file in smaller components and even on Home windows there’s a “join” command on the shell.

See also  App Watch: KVADPhoto+

Find out how to cut up it, is dependent upon your system, you must give extra data for me to have the ability to provide you with precise recommendation.

With low training shoppers on your switch, the encryption (with a contemporary, current ZIP) and pushing it to a HTTPD could be greatest or with a cloud. Low training receiver can have issues to hitch the components collectively. Nonetheless, there may be, I feel, an possibility in ZIP, no less than on Linux to do multi-volume archives, this might even be used for low-ed receivers.

With ZIP the choice to create cut up archives is “-s” and also you inform the megabyte dimension as a quantity, like “-s100” could be in in 35×100 mb blocks. Works. The password possibility for ZIP is -P password whereas to name it from command line is taken into account unsafe, as a result of the command line will be noticed on a multi-user system.

Go although the ZIP handbook in case you are on such a factor. A password with lower than 15 random characters at present is to be thought-about unsafe.

Multi-volume ZIP needs to be joined by hand with “join”, so far as I bear in mind, RAR is best, however I’m not certain how good the implementation of the encryption is there. I often do the identical factor with “tar”, or “7zip”, which each are a lot better suited, however not accessible on commonplace Home windows techniques and you may neglect about lowed customers on the receiving finish to take care of that.

See we’re at present on the similar horrible state of affairs the place folks have been in WW2, the place the encryption was good, however the customers of the encryption have been so daft, that they needed to cut back safety to create an atmosphere the place idiots can work with it. What got here from that’s identified.

See also  Refog Spy App Review 2020: Is Refog Really work?

Similar downside with WW1, by the best way. The russian military nonetheless used “cesar” chiffre, as a result of the generality couldn’t deal with something higher than that, very a lot to the amusement of German codebreakers at the moment.

I can inform you at this second lots higher methods to do that, lots safer methods, however that doesn’t work for lowed customers. No fats probability. Effectively. Okay.

There’s a method you are able to do it, after all. If you’ll be able to program and solely the opposite facet of the correspondence is lowed, you possibly can write a self decrypting factor. That works simply with Lua, the way to work with onerous encryption and self-decrypting I’ve already posted someplace on Quora so far as I bear in mind, however that’s no less than a 12 months in the past.

How create such a file on Home windows is a little more stress for you, however will be thought-about very protected certainly, even with idiots aka lowed, low-iq, noskill private aka administration on the receiving finish, since you management the entire encryption/decryption course of by your self and the little program.

Leave a Reply

Your email address will not be published.