<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Anleitung | Kielburger IT-Consulting</title>
	<atom:link href="https://kielburger.de/en/tag/anleitung/feed/" rel="self" type="application/rss+xml" />
	<link>https://kielburger.de/en</link>
	<description>Individual Consulting.</description>
	<lastBuildDate>Tue, 18 Jun 2024 00:29:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://kielburger.de/wp-content/uploads/cropped-K_1000px_transp-32x32.png</url>
	<title>Anleitung | Kielburger IT-Consulting</title>
	<link>https://kielburger.de/en</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Passwords: Size Does Matter!</title>
		<link>https://kielburger.de/en/pass/</link>
		
		<dc:creator><![CDATA[Patrick]]></dc:creator>
		<pubDate>Mon, 01 Jul 2019 13:18:41 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Anleitung]]></category>
		<category><![CDATA[character variety]]></category>
		<category><![CDATA[Datenverschlüsselung]]></category>
		<category><![CDATA[dictionary attacks]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password length]]></category>
		<category><![CDATA[password logic]]></category>
		<category><![CDATA[Password security]]></category>
		<category><![CDATA[Passwort]]></category>
		<category><![CDATA[Passworterstellung]]></category>
		<category><![CDATA[Passwortgenerator]]></category>
		<category><![CDATA[Passwortsicherheit]]></category>
		<category><![CDATA[Passworttipps]]></category>
		<category><![CDATA[Sicherheit]]></category>
		<category><![CDATA[Sicherheitstipps]]></category>
		<category><![CDATA[unique passwords]]></category>
		<category><![CDATA[Zeichenvielfalt]]></category>
		<guid isPermaLink="false">https://kielburger.de/?p=795</guid>

					<description><![CDATA[<p>Tips for strong passwords: Use unique passwords, avoid dictionary words, logic patterns, and opt for longer passwords with diverse characters. Store them securely.</p>
The post <a href="https://kielburger.de/en/pass/">Passwords: Size Does Matter!</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></description>
										<content:encoded><![CDATA[<p>This article is supposed to show what matters about passwords and what kind of mistakes people usually make. Advanced security methods, like two factor authentication are not part of this article. Always make sure that security software that you use is trust-worthy.</p>
<h3>1) Use each password only ONCE.</h3>
<p>Anytime, one of your accounts can be compromised. It is not even up to you: Often times databases of web portals or smartphone apps get hacked.<br />
The attacker will likely try to use your account data on different web sites.<br />
Let&#8217;s assume for example, that the credentials for your account of the local newspaper get compromised. It might not be too big of a damage: Someone is now able to illegally read the newspaper for free.<br />
But the damage gets much bigger if that person is able to now also read your emails (using the same credentials as in the newspaper account). Probably that person will find personal data, addresses of friends and is also able to gain access to multiple other accounts by using the &#8220;Forgot password&#8221;-option.</p>
<h3>2) Do not use a dictionary.</h3>
<p>If an attacker tries to guess a password, he or she will likely use the &#8220;dictionary method&#8221;.<br />
Words from a dictionary will be used to guess an eventual password. This also includes first names, car models, sport clubs and much more. Adding a number or replacing a letter with a number won&#8217;t fool the attacker&#8217;s program.<br />
So please avoid passwords like Chris123, D0n4ld or BMW323.</p>
<h3>3) Do not use logic.</h3>
<p>Often times passwords contain logic patterns. Attackers know this and take advantage of it. Even if it helps you remembering, try to avoid logic in your passwords.<br />
Using letters in alphabetic or keyboard-layout order or using easy number sequences is generally a bad idea.<br />
Therefore, passwords like abc123, qwert987 or 24681012 are easy to guess and should not be used.</p>
<h3>4) Size does matter!</h3>
<p>We knew it: Size does matter. Using a one-digit password with only numbers will give us 10 combinations of possible passwords. (0, 1, 2, 3&#8230;9) If we use two digits, we could have 100 possible combinations. (00 up to 99)<br />
With each digit that we add to our password, the strength increases exponentially. If you use 5 instead of 4 digits, then the safety of a password didn&#8217;t only increase by a quarter or a factor one. It increased 10-fold. When we use other digits besides numbers, this effect will increase.<br />
More possible combinations will make a password harder to guess.</p>
<h3>5) Numbers, upper-case letters, lower-case letters and special characters</h3>
<p>There are 26 upper-case and 26 lower-case letters and 10 numbers. This equals 62 possibilities.<br />
Special characters can increase this even further. The hindsight is, that some web portals do not allow all special characters. Therefore it makes sense to check if special characters are allowed in each password you create.<br />
Generally speaking, the more types of characters you are using, the safer your password becomes.</p>
<h3>6) Store your passwords in a safe place.</h3>
<p>All our carefulness can be worthless if we write down our passwords on a piece of paper that is right on the desk where any guest or colleague has access to.<br />
If it has to be written down to paper, then store the paper in a safe location.<br />
Storing passwords in an encrypted database on your computer is even safer. Free software like Passwordsafe, Revelation or KeePass will allow this. Most of this software will run on Windows, Linux and even on smartphones with Android or iOS.</p>
<h3>Practical hint: Use a password generator.</h3>
<p>The internet offers a good number of password generators. Some of them can be used in the browser directly. They will create a secure password automatically.<br />
Previously mentioned password managers will most-likely have a password creation function included.</p>
<h3>Examples</h3>
<p>Here are some examples for good passwords:<br />
9rZb#7LU6Es#UxEU<br />
!pQEqfXaAXDa%6-n&amp;@M&amp;S$Z<br />
ns6cs34fjRWWL7xhNq3c6Dnc6MkNcXme</p>
<p>Please be aware, that all of this informations and/or tutorials come without any type of warranty.</p>The post <a href="https://kielburger.de/en/pass/">Passwords: Size Does Matter!</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Easy and Secure: Email Encryption</title>
		<link>https://kielburger.de/en/pgp/</link>
		
		<dc:creator><![CDATA[Patrick]]></dc:creator>
		<pubDate>Tue, 18 Jun 2019 18:01:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Anleitung]]></category>
		<category><![CDATA[Asymmetric key algorithms]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[E-Mail-Verschlüsselung]]></category>
		<category><![CDATA[Email encryption]]></category>
		<category><![CDATA[Encryption tools]]></category>
		<category><![CDATA[Enigmail]]></category>
		<category><![CDATA[Kommunikation]]></category>
		<category><![CDATA[OpenPGP]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[Pretty Easy Privacy (PEP)]]></category>
		<category><![CDATA[Sicherheit]]></category>
		<category><![CDATA[Thunderbird]]></category>
		<guid isPermaLink="false">https://kielburger.de/?p=760</guid>

					<description><![CDATA[<p>Enhance email security with PGP encryption. OpenPGP ensures data safety. PEP simplifies encryption processes for secure communication.</p>
The post <a href="https://kielburger.de/en/pgp/">Easy and Secure: Email Encryption</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></description>
										<content:encoded><![CDATA[<p>In the early days of the internet, communication usually happened unencrypted. In this time an email used to be as secure as a postcard. Everyone who had access to any point of the transfer was able to read along.<br />
Only in the last few years, data communication started to be encrypted, fe. with SSL. But SSL only encrypts the transmission of the data, not the data itself.<br />
There is generally speaking no guarantee that anyone of the involved email servers is actually using secure encryption methods. Also, email messages are stored unencrypted in the postboxes of providers. Often times postboxes had been compromised (&#8220;hacked&#8221;). Usually, hackers do not target to attack a single person. They rather try to generally find security leaks and take advantage of them. Security leaks can be weak password or weak systems for example.</p>
<p>In order to defend against that, it is possible to encrypt the whole email message instead of only encrypting the transfer. The standard PGP (&#8220;pretty good privacy&#8221;) allows it. Other than the name may suggest, this system is actually really safe instead of being &#8220;pretty good&#8221;. And thanks to OpenPGP it is also open-source and freely available.</p>
<p>Please feel free to skip the following paragraph if you don&#8217;t like things to be too technical. For our email encryption, PGP uses asymmetric key algorithms. The recipient (person A) of a message has a private key. It is needed to decrypt a message. The sender (person B) needs the public key of person A for the encryption of the message. Person A, the recipient, needs to transmit this public key to person B before encryption can happen. After that, person B will be able to encrypt and send a message with the public key of person A. As long as person A keeps its private key safely on its PC, only person A will be able to read its messages.<br />
In order to send a message from person A to person B, person A needs the public key of person B.<br />
If there are any doubts about a person really being who the person claims to be, a so called &#8220;handshake&#8221; can be performed. In practice, this means the exchange of security words away from keyboard. The security words can be transmitted on the phone or in real live. This makes the email conversation not only secure, but also reliable.</p>
<p>Honestly, this sounded complicated. And it actually used to be complicated for a long time. Thanks to a project called PEP (&#8220;Pretty Easy Privacy&#8221;) it got really easy now. PEP can be installed as an add-on for some email client programs and will take care of everything regarding encryption. This includes generating, attaching and importing of public keys and also generating a private key and decrypting incoming encrypted messages. If the conversational partners are using OpenPGP without PEP, it is still possible to communicate encrypted. Add-Ons with PEP like Enigmail are freely available for email clients like Thunderbird. There are also commercial extensions, for example for Outlook.</p>
<p>The following lines are supposed to show how you can encrypt your email conversations -completely free- with Thunderbird and the Add-On Enigmail with PEP. The following pictures have been made on a GNU/Linux-based operating system with Thunderbird 60.7.0 (64-bit). The operation can be different with other operating systems and software versions.</p>
<h4><strong>Step 1: Open Menu (1) in Thunderbird and click on Add-Ons twice (2).</strong></h4>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-764 size-full" src="https://kielburger.de/wp-content/uploads/10.png" alt="" width="1168" height="718" srcset="https://kielburger.de/wp-content/uploads/10.png 1168w, https://kielburger.de/wp-content/uploads/10-300x184.png 300w, https://kielburger.de/wp-content/uploads/10-768x472.png 768w, https://kielburger.de/wp-content/uploads/10-1024x629.png 1024w" sizes="(max-width: 1168px) 100vw, 1168px" /></p>
<h4><strong>Step 2: Search for the Add-On &#8220;Enigmail&#8221;.</strong></h4>
<p><img decoding="async" class="alignnone wp-image-768 size-full" src="https://kielburger.de/wp-content/uploads/20.png" alt="" width="938" height="355" srcset="https://kielburger.de/wp-content/uploads/20.png 938w, https://kielburger.de/wp-content/uploads/20-300x114.png 300w, https://kielburger.de/wp-content/uploads/20-768x291.png 768w" sizes="(max-width: 938px) 100vw, 938px" /></p>
<h4><strong>Step 3: Install Enigmail (self-explaining)<br />
<img decoding="async" class="alignnone size-medium wp-image-771" src="https://kielburger.de/wp-content/uploads/40-300x207.png" alt="" width="300" height="207" srcset="https://kielburger.de/wp-content/uploads/40-300x207.png 300w, https://kielburger.de/wp-content/uploads/40.png 546w" sizes="(max-width: 300px) 100vw, 300px" /> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-772" src="https://kielburger.de/wp-content/uploads/50-300x27.png" alt="" width="300" height="27" srcset="https://kielburger.de/wp-content/uploads/50-300x27.png 300w, https://kielburger.de/wp-content/uploads/50-768x70.png 768w, https://kielburger.de/wp-content/uploads/50.png 983w" sizes="auto, (max-width: 300px) 100vw, 300px" /> </strong></h4>
<p><strong>Enigmail automatically creates a private and a public key in the background. There is nothing to do for you. The picture just illustrates that a new key has been created.</strong><img loading="lazy" decoding="async" class="alignnone size-full wp-image-773" src="https://kielburger.de/wp-content/uploads/60.png" alt="" width="706" height="477" srcset="https://kielburger.de/wp-content/uploads/60.png 706w, https://kielburger.de/wp-content/uploads/60-300x203.png 300w" sizes="auto, (max-width: 706px) 100vw, 706px" /></p>
<h4><strong>Step 4: Importing the first key</strong></h4>
<p><strong>We receive an email from someone who is also using PGP-based encryption. Enigmail automatically recognizes that a public key is attached to the email. If we want to answer or send a regular email to this participant, it will be automatically encrypted.<img loading="lazy" decoding="async" class="alignnone size-full wp-image-774" src="https://kielburger.de/wp-content/uploads/70.png" alt="" width="792" height="554" srcset="https://kielburger.de/wp-content/uploads/70.png 792w, https://kielburger.de/wp-content/uploads/70-300x210.png 300w, https://kielburger.de/wp-content/uploads/70-768x537.png 768w" sizes="auto, (max-width: 792px) 100vw, 792px" /><br />
</strong></p>
<h4><strong>Step 5: Sending the first encrypted email and eventually performing a handshake</strong></h4>
<p><strong>PEP shows, that this message is secure. This means, that right now we are sending this message encrypted. Our own public key will be automatically attached. Therefore the recipient will be able to encrypt its answer message.<br />
Eventually we also want to secure the trust between us and the recipient of this email by performing a handshake. This is not mandatory, though.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-775" src="https://kielburger.de/wp-content/uploads/80.png" alt="" width="866" height="718" srcset="https://kielburger.de/wp-content/uploads/80.png 866w, https://kielburger.de/wp-content/uploads/80-300x249.png 300w, https://kielburger.de/wp-content/uploads/80-768x637.png 768w" sizes="auto, (max-width: 866px) 100vw, 866px" /><br />
By clicking on the yellow-marked area &#8220;Secure&#8221; the handshake can be arranged. PEP will give self-explaining instructions about this. If you want to perform a handshake, it has to be re-done for each participant you are communicating with.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-776" src="https://kielburger.de/wp-content/uploads/90.png" alt="" width="656" height="527" srcset="https://kielburger.de/wp-content/uploads/90.png 656w, https://kielburger.de/wp-content/uploads/90-300x241.png 300w" sizes="auto, (max-width: 656px) 100vw, 656px" /><br />
</strong></p>
<h4><strong>Done. We have just massively increased the security of our email conversations.</strong></h4>
<p><strong>Hints:</strong></p>
<ul>
<li>Even if the email itself is encrypted, the transmission should still be secured with SSL. Only by encrypting the transmission it can be assured that meta data and passwords are also transferred encrypted.</li>
<li>If our interlocutor does not use any type of PGP/PEP/OpenPGP-encryption, we won&#8217;t be able to communicate encrypted with that person. It always takes two! Enigmail with PEP will always show you if a message will actually be sent encrypted.</li>
<li>Whenever we receive an encrypted message, it can only be decrypted with our private key. Therefore it makes sense to have backup of our key that is stored secure and privately, fe. on an encrypted USB flash drive.</li>
<li>Reading encrypted messages is generally only possible with an email client program like Thunderbird. Reading encrypted messages on the web, fe. at GMail or Hotmail is only possible with a few providers with browser add-ons. Not every provider allows reading encrypted messages and some do only with limitations.</li>
</ul>
<p>Please be aware, that all of this informations and/or tutorials come without any type of warranty.</p>The post <a href="https://kielburger.de/en/pgp/">Easy and Secure: Email Encryption</a> first appeared on <a href="https://kielburger.de/en">Kielburger IT-Consulting</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
