Similar Articles |
|
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
Macworld July 2000 Tom Negrino |
Protect Your e-Mail Keep Your Private Words from Prying Eyes |
JavaWorld January 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. |
PC World October 24, 2007 Erik Larkin |
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. |
PC Magazine May 18, 2004 Bill Machrone |
Secure Instant Messaging Here's how to keep IM conversations safe at work. |
PC Magazine September 21, 2005 Neil J. Rubenking |
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. |
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
JavaWorld April 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... |
Technology Research News September 19, 2005 |
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals. |
Technology Research News December 17, 2003 |
Hybrid crypto secures images Researchers from National Chung Cheng University and National Yunlin University of Science and Technology in Taiwan have devised a way to encrypt in a single communication an image and the secret session key that unlocks the image. |
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption. |
PC Magazine September 18, 2008 Neil Randall |
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. |
JavaWorld December 2002 Michael Juntao Yuan |
Data security in mobile Java applications Learn how to select and use third-party security toolkits |
Science News December 8, 2007 Julie J. Rehmeyer |
Math Trek: Mathematical Police Find Security Bug Cryptographers uncover potential weakness in encryption algorithms. |
JavaWorld August 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. |
PC Magazine April 24, 2007 Neil J. Rubenking |
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security. |
JavaWorld October 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 2 Introduction to XML Digital Signature, a standard that handles a document's integrity, including how to write XML Signature code using an implementation currently available: IBM XML Security Suite. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
Macworld August 15, 2005 Glenn Fleishman |
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. |
IEEE Spectrum January 2009 Monica Heger |
Cryptographers Take On Quantum Computers Researchers prepare for the day when quantum computers can easily crack today's codes. |
CIO October 15, 2000 J. Brown |
Emerging Technology Digitally signed documents could streamline business processes... |
Popular Mechanics October 20, 2008 John Brownlee |
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. |
InternetNews January 15, 2008 Andy Patrizio |
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
Macworld April 2003 Glenn Fleishman |
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
PC World March 22, 2001 Cameron Crouch |
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... |
InternetNews December 31, 2008 Richard Adhikari |
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. |
PC World November 7, 2006 Andrew Brandt |
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. |
PC World March 2, 2001 |
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... |
IEEE Spectrum March 2007 Samuel K. Moore |
Commercializing Quantum Keys It's a strange business, turning the esoteric quantum properties of light into money. But there are a few brave companies that have been trying to do just that for the last five years, and they may have hit on the right way to do it. |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
Popular Mechanics August 26, 2008 |
Lasers Could Send World's Most Secure Messages Through Space Scientists at an Italian observatory this year succeeded in firing lasers at the mirror-covered Ajisai Japanese satellite, proving that a sequence of photons can travel great distances through space. |
PC Magazine June 13, 2011 Eric Griffith |
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. |
InternetNews February 15, 2006 Erin Joyce |
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
PC Magazine October 1, 2003 Cade Metz |
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. |
CRM March 2, 2012 Raul Ortega |
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. |
Bank Technology News April 1, 2008 Farquharson & Goldsmith |
SOA Security Policies Across Partnerships The idea of business partners sharing security policies for electronic transactions is relatively new. |
PC Magazine January 20, 2009 Matthew D. Sarrel |
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. |
Salon.com February 4, 2002 Barak Jolish |
The encrypted jihad We can't stop terrorists from using uncrackable codes. So we shouldn't even try... |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
PC Magazine February 5, 2009 Joel Santo Domingo |
Lenovo ThinkPad USB Portable Secure Drive If you need to keep your data secure and portable, the Lenovo ThinkPad USB Portable Secure Drive is a simple-to-use option. |
PC Magazine October 11, 2006 Robert Lemos |
New Ways to Nab Spam More than a third of all e-mail now carries digital markers to help prove where it came from, which helps reduce spam. |
PC World March 20, 2007 Dunn & Spanbauer |
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. |
PC World December 20, 2006 Andrew Brandt |
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. |
Financial Advisor June 2008 David Lawrence |
Keeping It Private In this age of malicious software, computer viruses, and other means of stealing information, it should seem obvious to most financial advisors to take steps to protect client and firm data. Yet many firms still do not do this. |
Technology Research News January 28, 2004 Kimberly Patch |
Neural-chaos team boosts security The best way to send a secret message is to scramble it with a random code, and an excellent source of randomness is chaos. The trick is sharing the randomness only with intended receivers. Grafting chaos and neural networks makes this possible, even over public channels. |