MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Macworld
August 15, 2005
Glenn Fleishman
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
PC World
November 7, 2006
Andrew Brandt
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. mark for My Articles similar articles
PC World
July 22, 2002
Deborah Radcliff
What Does the Future Hold for PGP? Network Associates no longer supports the encryption technology, but that doesn't mean it will disappear. mark for My Articles similar articles
Macworld
July 2000
Tom Negrino
Protect Your e-Mail Keep Your Private Words from Prying Eyes mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
PC World
September 2005
Andrew Brandt
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. mark for My Articles similar articles
Salon.com
March 27, 2002
Bill Lamb
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver? mark for My Articles similar articles
InternetNews
May 10, 2005
Michael Singer
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
PC Magazine
April 24, 2007
Neil J. Rubenking
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security. mark for My Articles similar articles
Macworld
December 2000
David Pogue
Explore with Care Once you've installed the beta, it's time to take your first steps into the future of the Mac. Just make sure you walk in with your eyes open... mark for My Articles similar articles
Macworld
November 2000
Andrew Gore
Dawn of a New OS Mac OS X's Arrival Is Apple's Opportunity to Prove It Is Listening To Its Customers... mark for My Articles similar articles
Macworld
October 2002
Stephan Somogyi
Veteran Disk-Tools Suite Gains OS X Support but Not Speed A package such as Norton Utilities 7.0.1 for Macintosh -- Symantec's OS X-only update to its well-known set of tools for file and disk recovery and maintenance -- can save your day. mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
Macworld
June 2001
Henry Bortman
Are You Ready for OSX? OS X is here at last, and you can't wait to begin using it. The impulse is understandable, but switching to OS X May not be prudent... mark for My Articles similar articles
InternetNews
May 11, 2007
Andy Patrizio
Intel, PGP In Security Hookup Intel and PGP have announced a partnership to sell encryption products on systems with Centrino Pro and vPro technologies. mark for My Articles similar articles
PC Magazine
July 7, 2011
Eric Griffith
How to Recover Your Lost Data When you accidentally delete a file or folder and can't find it in the trash, there are tools you can use to get back what you lost. mark for My Articles similar articles
Linux Journal
September 2001
Mick Bauer
GPG: the Best Free Crypto You Aren't Using, Part I of II An introduction to the underappreciated, 100% free utility you didn't know you needed (but do) -- GnuPG... mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
Salon.com
November 2, 2000
Daniel Drew Turner
Apple gilds the lily The new Macintosh operating system may annoy both geeks and rookies... mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
Bank Systems & Technology
July 28, 2006
Encrypting From the Inside Northern Trust Images Checks With Fiserv... Largest Worldwide Core Banking Deployment... Fremont Bank Launches E-Mortgage Solution... mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
InternetNews
July 16, 2004
Michael Singer
Philip Zimmermann, PGP Creator The e-mail encryption software writer talks about ways technologists can protect privacy and still make money. mark for My Articles similar articles
InternetNews
April 10, 2006
David Needle
IBM's Answer to Security Blues IBM said it's developed technology that promises to bring mainframe-inspired levels of security to PCs, cell phones, PDAs and other digital devices. mark for My Articles similar articles
Entrepreneur
November 2002
Mike Hogan
Unhappy Trails Keeping your private communications secure isn't as easy as you might think. Any way you look at it, our reliance on e-mail and IM makes it difficult to keep proprietary information private. mark for My Articles similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
PC Magazine
October 14, 2003
Leon Erlanger
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions. mark for My Articles similar articles
New Architect
January 2003
Thomas Claburn
Pretty Good Isn't Good Enough Phil Zimmermann, creator of PGP (Pretty Good Privacy) encryption, won the crypto war. Whither privacy? mark for My Articles similar articles
PC Magazine
August 31, 2005
Ryan Naraine
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications. mark for My Articles similar articles
PC World
August 2004
Jeff Bertolucci
Products for the Paranoid Fingerprint scanners, security keys, encryption software: Which tools should you use to keep sensitive data from prying eyes? mark for My Articles similar articles
InternetNews
June 5, 2006
Paul Shread
Storage Security Vendors Stay Busy Kasten Chase may have closed its doors, but other storage security vendors are busy rolling out new products. mark for My Articles similar articles
InternetNews
April 29, 2010
Symantec Picks Up PGP, GuardianEdge Acquisitions should help Symantec vendor raise its profile in the data encryption space, key technology used for sharing and storing information in the cloud. mark for My Articles similar articles
JavaWorld
January 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... mark for My Articles similar articles