yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Is Free Encryption Worth It?
Is encryption worth the headache when using the public cloud?

While in constant debate over data encryption and ease of access, I encountered a train of thought that made my jaw drop. A tradeshow attendee suggested encrypting everything, but just use a weak algorithm; so as not to make it impossible to decode if needed in the future.

Before smirking and quoting statistics as truth, I stopped to ponder: was there any merit to the statement, what was the sensitivity level of the data, where was it being stored, who had access to it, what was the definition of a weak algorithm, was this archival data or was it accessed and changed often?

Through conversation, the premise was potentially plausible (with some big question marks), but the logic was still thoroughly flawed. Yes, the data was constantly changing and only updated records were being sent to branch offices via a public cloud file sharing service, but the data did contain personally identifiable information. The last time I checked, people do not change their social security numbers very often and data captured by an intruder will stay in its captured state.

The attendee’s second concern was that using ciphers based on strong algorithms, would cause a load on older hardware. I wondered if a breach cost more than updating old hardware, apparently not. A weak algorithm using a public or private cipher, translates to cracked passwords or credentials. The Enigma code kept the Allies busy for a while, but it was cracked; just like WEP, MD5, and earlier versions of SSL today.

A company knowingly cannot use ciphers that can be compromised as their font-line (in this case only line) of defense. If this person was concerned about product and server upgrade costs; use one of the free encryption applications that use strong and proven algorithms. Many applications and operating systems have open source cousins and so do many widely used encryption algorithms. Many of them are easier to use than a licensed copy and they have a small footprint.

The latest completely free encryption application I found and have begun using exclusively is based on the PGP algorithm, provides numerous options for cipher strength, and is fast and nimble. Another great thing about GoAnywhere OpenPGP Studio is that it runs on Mac OS X, Windows, and Linux.

Final analysis - If your company has chosen to “standardize on the cloud,” be safe and make sure anything you put up there is still yours when you pull it back down.

About Dirk Zwart
Born in Canada and calling Nebraska home, Dirk primarily writes on the Technical side of the IT realm. Having written for years at Gateway Computer and as part of other large IT organizations, Dirk happily writes for Linoma Software. When not writing children's stories or stage scripts, you'll find Dirk out back in the vegetable garden or building yet another server for reasons unknown. Follow Dirk on Twitter, Facebook, or LinkedIn.

Latest Cloud Developer Stories
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the l...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relatio...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing sm...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Tele...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers