Now that you’ve got some theoretical know-how on how cryptography works, it’s time we apply this on a practical level. In this chapter we’ll be examining some popular operating systems and how they handle cryptographic matters. We’ll also be looking at other types of related software and how they can help you and your organization in maintaining privacy and any potential trade secrets. Let’s start off by defining (and/or revisiting) some concepts relevant to all forms of digital cryptography.
Storage Devices, Sectors, and Blocks
It’s indeed time ...