MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
Macworld
July 2000
Tom Negrino
Protect Your e-Mail Keep Your Private Words from Prying Eyes mark for My Articles similar articles
JavaWorld
January 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. mark for My Articles similar articles
PC Magazine
May 18, 2004
Bill Machrone
Secure Instant Messaging Here's how to keep IM conversations safe at work. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
JavaWorld
April 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... mark for My Articles similar articles
Technology Research News
September 19, 2005
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals. mark for My Articles similar articles
Technology Research News
December 17, 2003
Hybrid crypto secures images Researchers from National Chung Cheng University and National Yunlin University of Science and Technology in Taiwan have devised a way to encrypt in a single communication an image and the secret session key that unlocks the image. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
JavaWorld
December 2002
Michael Juntao Yuan
Data security in mobile Java applications Learn how to select and use third-party security toolkits mark for My Articles similar articles
Science News
December 8, 2007
Julie J. Rehmeyer
Math Trek: Mathematical Police Find Security Bug Cryptographers uncover potential weakness in encryption algorithms. mark for My Articles similar articles
JavaWorld
August 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. mark for My Articles similar articles
PC Magazine
April 24, 2007
Neil J. Rubenking
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security. mark for My Articles similar articles
JavaWorld
October 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 2 Introduction to XML Digital Signature, a standard that handles a document's integrity, including how to write XML Signature code using an implementation currently available: IBM XML Security Suite. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Macworld
August 15, 2005
Glenn Fleishman
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. mark for My Articles similar articles
IEEE Spectrum
January 2009
Monica Heger
Cryptographers Take On Quantum Computers Researchers prepare for the day when quantum computers can easily crack today's codes. mark for My Articles similar articles
CIO
October 15, 2000
J. Brown
Emerging Technology Digitally signed documents could streamline business processes... mark for My Articles similar articles
Popular Mechanics
October 20, 2008
John Brownlee
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
Macworld
April 2003
Glenn Fleishman
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
PC World
March 22, 2001
Cameron Crouch
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... mark for My Articles similar articles
InternetNews
December 31, 2008
Richard Adhikari
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. mark for My Articles similar articles
PC World
November 7, 2006
Andrew Brandt
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. mark for My Articles similar articles
PC World
March 2, 2001
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... mark for My Articles similar articles
IEEE Spectrum
March 2007
Samuel K. Moore
Commercializing Quantum Keys It's a strange business, turning the esoteric quantum properties of light into money. But there are a few brave companies that have been trying to do just that for the last five years, and they may have hit on the right way to do it. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
Popular Mechanics
August 26, 2008
Lasers Could Send World's Most Secure Messages Through Space Scientists at an Italian observatory this year succeeded in firing lasers at the mirror-covered Ajisai Japanese satellite, proving that a sequence of photons can travel great distances through space. mark for My Articles similar articles
PC Magazine
June 13, 2011
Eric Griffith
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. mark for My Articles similar articles
InternetNews
February 15, 2006
Erin Joyce
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
Bank Technology News
April 1, 2008
Farquharson & Goldsmith
SOA Security Policies Across Partnerships The idea of business partners sharing security policies for electronic transactions is relatively new. mark for My Articles similar articles
PC Magazine
January 20, 2009
Matthew D. Sarrel
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. mark for My Articles similar articles
Salon.com
February 4, 2002
Barak Jolish
The encrypted jihad We can't stop terrorists from using uncrackable codes. So we shouldn't even try... mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
PC Magazine
February 5, 2009
Joel Santo Domingo
Lenovo ThinkPad USB Portable Secure Drive If you need to keep your data secure and portable, the Lenovo ThinkPad USB Portable Secure Drive is a simple-to-use option. mark for My Articles similar articles
PC Magazine
October 11, 2006
Robert Lemos
New Ways to Nab Spam More than a third of all e-mail now carries digital markers to help prove where it came from, which helps reduce spam. mark for My Articles similar articles
PC World
March 20, 2007
Dunn & Spanbauer
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. mark for My Articles similar articles
PC World
December 20, 2006
Andrew Brandt
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. mark for My Articles similar articles
Financial Advisor
June 2008
David Lawrence
Keeping It Private In this age of malicious software, computer viruses, and other means of stealing information, it should seem obvious to most financial advisors to take steps to protect client and firm data. Yet many firms still do not do this. mark for My Articles similar articles
Technology Research News
January 28, 2004
Kimberly Patch
Neural-chaos team boosts security The best way to send a secret message is to scramble it with a random code, and an excellent source of randomness is chaos. The trick is sharing the randomness only with intended receivers. Grafting chaos and neural networks makes this possible, even over public channels. mark for My Articles similar articles