{"id":679,"date":"2014-11-18T22:47:23","date_gmt":"2014-11-18T21:47:23","guid":{"rendered":"http:\/\/www.upgreat.com.pl\/blog\/?p=40"},"modified":"2014-11-18T22:47:23","modified_gmt":"2014-11-18T21:47:23","slug":"proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci","status":"publish","type":"post","link":"https:\/\/www.upgreat.pl\/en\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/","title":{"rendered":"Simple, fast and secure transmission of confidential content."},"content":{"rendered":"<p>\t\t\t\tSending confidential content by e-mail is a fairly common practice. Unfortunately, not always people exchanging information with each other are able to take advantage of such facilities as encrypted e-mail communication, encryption keys or certificates. If sending confidential data is incidental and is not systematically resolved by the IT department, users often resort to the simplest measures in the form of office suite files protected with a password or compressed with a password-protected program such as winzip or winrar. Such solutions, although they seem safe, are characterized by a high level of risk. For the sake of compatibility, the most popular document formats are saved using low-security algorithms. There is a whole range of tools available to help crack passwords for files in the .doc, .docx, .xls, .xlsx or .zip formats.<\/p>\n<p>So how to deal with a situation when the data we want to send must be quickly and securely delivered to the recipient? <!--more-->A free program, licensed under the GNU LGPL license, comes to our aid here <a href=\"http:\/\/www.7-zip.org\/\">7zip<\/a>. It allows you to compress files using the AES-256 algorithm with a 256-bit key length. Moreover, in order to make it difficult to crack the password with dictionary or brute force methods, the key is saved in an iteration of several hundred repetitions. This means that checking each entry from a dictionary or generator requires several hundred times more time than in the case of other formats. While when saving or reading a file, this difference is imperceptible to the user, for a potential intruder the effect is as if instead of a modern processor he was using a museum exhibit to break the password.<\/p>\n<p>So when using compressed <a href=\"http:\/\/www.7-zip.org\/\">7zip<\/a> The AES-256 algorithm and the appropriate long (several characters), non-dictionary password can easily protect your confidential files. Of course, it should be remembered that in the case of sending them by e-mail, the password should be provided to the recipient by another channel, e.g. by means of a text message.<\/p>\n<p>In order to use the functions described, which increase security, you should archive files according to the following instructions:<\/p>\n<ol>\n<li>Right-click on the file or directory and select: &quot;7-zip -&gt; Add to archive ...&quot; from the context menu<\/li>\n<li>In the opened window, select Archive format: 7z and Encryption method: AES-256 and enter a long, non-dictionary password in the &quot;Enter password&quot; field.<\/li>\n<li>Click &quot;OK&quot;<\/li>\n<\/ol>\n<p>&nbsp;\t\t<\/p>","protected":false},"excerpt":{"rendered":"<p>Sending confidential content via e-mail is a fairly common practice. Unfortunately, not always people exchanging information are able to use facilities such as encrypted e-mail communication, encryption keys or certificates. If sending confidential data is incidental and not systematically resolved by the IT department, users often resort [...]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[24,25,26],"class_list":["post-679","post","type-post","status-publish","format-standard","hentry","category-aktualnosci","tag-bezpieczna-komunikacja","tag-ochrona-danych","tag-szyfrowanie-plikow"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci. | Upgreat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci. | Upgreat\" \/>\n<meta property=\"og:description\" content=\"Przesy\u0142anie tre\u015bci o charakterze poufnym drog\u0105 mailow\u0105 jest dosy\u0107 cz\u0119sto spotykan\u0105 praktyk\u0105. Niestety nie zawsze osoby wymieniaj\u0105ce pomi\u0119dzy sob\u0105 informacje s\u0105 w stanie skorzysta\u0107 z takich udogodnie\u0144 jak szyfrowana komunikacja mailowa, klucze szyfruj\u0105ce czy certyfikaty. Je\u017celi wys\u0142anie poufnych danych ma charakter incydentalny i nie jest systemowo rozwi\u0105zane przez dzia\u0142 IT, to u\u017cytkownicy uciekaj\u0105 si\u0119 cz\u0119sto [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-18T21:47:23+00:00\" \/>\n<meta name=\"author\" content=\"ridos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ridos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\"},\"author\":{\"name\":\"ridos\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\"},\"headline\":\"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci.\",\"datePublished\":\"2014-11-18T21:47:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\"},\"wordCount\":415,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"keywords\":[\"bezpieczna komunikacja\",\"ochrona danych\",\"szyfrowanie plik\u00f3w\"],\"articleSection\":[\"Aktualno\u015bci\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\",\"url\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\",\"name\":\"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci. | Upgreat\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2014-11-18T21:47:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101\",\"name\":\"ridos\",\"sameAs\":[\"https:\/\/www.upgreat.pl\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci. | Upgreat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/","og_locale":"en_US","og_type":"article","og_title":"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci. | Upgreat","og_description":"Przesy\u0142anie tre\u015bci o charakterze poufnym drog\u0105 mailow\u0105 jest dosy\u0107 cz\u0119sto spotykan\u0105 praktyk\u0105. Niestety nie zawsze osoby wymieniaj\u0105ce pomi\u0119dzy sob\u0105 informacje s\u0105 w stanie skorzysta\u0107 z takich udogodnie\u0144 jak szyfrowana komunikacja mailowa, klucze szyfruj\u0105ce czy certyfikaty. Je\u017celi wys\u0142anie poufnych danych ma charakter incydentalny i nie jest systemowo rozwi\u0105zane przez dzia\u0142 IT, to u\u017cytkownicy uciekaj\u0105 si\u0119 cz\u0119sto [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/","og_site_name":"Upgreat","article_published_time":"2014-11-18T21:47:23+00:00","author":"ridos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ridos","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#article","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/"},"author":{"name":"ridos","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101"},"headline":"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci.","datePublished":"2014-11-18T21:47:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/"},"wordCount":415,"commentCount":0,"publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"keywords":["bezpieczna komunikacja","ochrona danych","szyfrowanie plik\u00f3w"],"articleSection":["Aktualno\u015bci"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/","url":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/","name":"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci. | Upgreat","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2014-11-18T21:47:23+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/blog\/proste-szybkie-i-bezpieczne-przesylanie-poufnych-tresci\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Proste, szybkie i bezpieczne przesy\u0142anie poufnych tre\u015bci."}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/d36f9c49b3812cc93a140745bf44a101","name":"ridos","sameAs":["https:\/\/www.upgreat.pl"]}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=679"}],"version-history":[{"count":0,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/679\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/categories?post=679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/tags?post=679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}