In this globalization era, the development of information and communication technology is developing very rapidly. Such communication and information technology is one type of technology that is ranked top, both in terms of positive, negative, to its use.
One of them is a computer. The computer itself is a technology machine with operating system control accompanied by programs that are able to receive and store data, perform processing and provide results in the form of information according to the formulated operating procedures. One component of a computer system is software.
Understanding software according to Roger S. Pressman (2002), Pressman said that what is meant by software or software is a program command in a computer, which if executed by the user will provide the functions and performance as expected by the user. This statement illustrates that this software serves to give computer commands, so that the computer can function optimally, in accordance with the wishes of the user who gave the command.
Inside the computer it self is contained very important information in an agency, especially government agencies that contain important information and many are classified. In addition to loading information or computer data files are also useful as an exchange of information or communication. This data exchange is useful as communication from central agencies to branch agencies. In the process of exchanging data there are certainly parties who try to steal the information or data through the exchange of data. But the security of information is always ruled out. The development of tools and software from information security is still considered lacking.
Crypto ++ (also known as CryptoPP, libcrypto ++, and libcryptopp) is a free and open C ++ library toolkit of cryptographic algorithms and schemes written by Wei Dai. Crypto ++ has been widely used in academics, student projects, open source and non-commercial projects, and business.  Released in 1995, the library fully supports 32-bit and 64-bit architectures for many major operating systems and platforms, including Android (using STLport), Apple (Mac OS X and iOS), BSD, Cygwin, IBM AIX and S / 390, Linux, MinGW, Solaris, Windows, Windows Phone and Windows RT. This project also supports compilation using the C ++ 03, C ++ 11 and C ++ 17 runtime libraries; and various compilers and IDEs, including Borland Turbo C ++, Borland C ++ Builder, Clang, CodeWarrior Pro, GCC (including Apple’s GCC), Intel C ++ Compiler (ICC), Microsoft Visual C / C ++, and Sun Studio.
Cryptocat is an open source application intended to enable encrypted online chat available for Windows, OS X, and Linux. It uses end-to-end encryption to secure all communications to other Cryptocat users. Users are given the option to independently verify their friend’s device list and are notified when the friend’s device list is modified and all updates have been verified through the built-in update downloader.
Cryptocat was developed by Nadim Kobeissi and the open source contributor community and is published under the GPLv3 license terms. Cryptocat was first launched on May 19, 2011 as a web application. In June 2012, Kobeissi said that he was detained at the U.S. border. by DHS and asked about Cryptocat sensor resistance. He tweeted about the incident later, resulting in media coverage and a surge in software popularity.
In June 2013, security researcher Steve Thomas pointed out a security bug that could be used to decrypt group chat messages that had been carried out using Cryptocat between September 2012 and April 19, 2013. Personal messages were not affected, and the bug was resolved the previous month. In response, Cryptocat issued a security advisor, asking all users to ensure that they had upgraded, and informing users that previous group conversations might have been compromised.
In February 2014, an audit by iSec Partners criticized the Cryptocat authentication model for being inadequate. In response, Cryptocat made improvements to user authentication, making it easier for users to authenticate and detect man-in-the-middle attacks.
In February 2016, citing dissatisfaction with the current state of the project after 19 months of non-maintenance, Kobeissi announced that he would immediately take Cryptocat for a while and stop developing his mobile application, pending complete rewriting and relaunching of the software. In March 2016 Kobeissi announced the relaunch of Cryptocat, completely rewritten as desktop software, not native web application software, as a public beta and the resumption of the service. The new desktop-centric approach allows Cryptocat to benefit from stronger desktop integration, with a style similar to Pidgin.
WolfSSL (formerly CyaSSL or other SSL) is a small, portable, embedded SSL / TLS library that is targeted for use by embedded system developers. This is an open source implementation of TLS (SSL 3.0, TLS 1.0, 1.1, 1.2, 1.3 and DTLS 1.0 and 1.2) written in C language. This includes the SSL / TLS client library and SSL / TLS server implementation and support for several APIs , including those defined by SSL and TLS. wolfSSL also includes an OpenSSL compatibility interface with the most commonly used OpenSSL functions.
The forerunner of wolfSSL, yaSSL is a C ++ based library based on an embedded environment and real time operating system with limited resources.
wolfSSL is currently available for Win32 / 64, Linux, macos, Solaris, Threadx, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, WinCE, Haiku, OpenWrt, iPhone, Android, Nintendo Wii and Gamecube through support for DevKitPro, QNX, MontaVista, Variants of Tron, NonStop, OpenCL, Micrium MicroC / OS-II, FreeRTOS, SafeRTOS, Freescale MQX, Nucleus, TinyOS, TI-RTOS, HP-UX, uTasker, and emboss.
The origin of yaSSL, or other SSL, originated in 2004. OpenSSL was available at the time, and was dual licensed with the OpenSSL License and SSLeay license. yaSSL, alternatively, was developed and given a dual license under a commercial and GPL license.  yaSSL offers a more modern API, commercial-style developer support and complete with OpenSSL compatibility layer. The first major user of wolfSSL / CyaSSL / yaSSL is MySQL. Through bundling with MySQL, yaSSL has achieved very high distribution volumes in the millions.
The CryptoLocker ransomware attack is a cyber attack using the CryptoLocker trojan that occurred from September 5, 2013 to the end of May 2014. The attack uses a trojan that targets computers running Microsoft Windows, and is believed to have been first posted on the Internet on September 5, 2013. It is distributed through attachments infected email, and through the existing Gameover ZeuS botnet. When activated, malware encrypts several types of files stored on local network drives and installed using RSA public key cryptography, with private keys stored only on the malware control server. The malware then displays a message offering to decrypt the data if payment (via a cash voucher or paid voucher) is made within the specified deadline, and will threaten to delete the private key if the deadline passes. If the deadline is not met, the malware offers to decrypt the data through online services provided by rogue software operators, at significantly higher prices on bitcoin. There is no guarantee that payment will release encrypted content.
Even though CryptoLocker itself is easily deleted, the affected files are still encrypted in a way that is considered inappropriate for researchers to solve. Many say that ransom does not have to be paid, but does not offer a way to recover files. Others say that paying a ransom is the only way to recover files that have not been backed up. Some victims claim that paying a ransom does not always lead to the decrypted file.
CryptoLocker was isolated at the end of May 2014 through Operation Tovar which took down the Gameover ZeuS botnet that had been used to distribute malware. During the operation, a security company involved in this process obtained a database of private keys used by CryptoLocker, which in turn was used to build online tools to recover keys and files without paying a ransom. It is believed that the CryptoLocker operator managed to extort a total of around $ 3 million from trojan victims. Another example of the encryption-based ransomware that has been followed has been using the name “CryptoLocker” (or variation), but the opposite is not related.