Similar Articles |
|
BusinessWeek November 19, 2007 Stephen H. Wildstrom |
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. |
PC Magazine November 14, 2007 Neil J. Rubenking |
Big SYS Files Are Okay They take up a lot of hard drive space, and you're not so sure what they do. But is it safe to delete those .sys files? |
CIO October 1, 2003 Lorraine Cosgrove Ware |
By the Numbers It's not just what you send, it's what you store that needs encryption. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
InternetNews September 13, 2007 Andy Patrizio |
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." |
InternetNews December 11, 2007 Paul Shread |
nCipher Scoops Up NeoScale nCipher has acquired the assets of NeoScale Systems after the storage security vendor wound down operations. |
InternetNews October 28, 2008 Richard Adhikari |
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
PC Magazine September 21, 2005 Neil J. Rubenking |
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. |
InternetNews March 12, 2007 Andy Patrizio |
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
Bank Systems & Technology June 1, 2004 George V. Hulme |
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. |
PC World September 26, 2007 Scott Mueller |
Reduce Your PC's Power and Operating Costs A few simple tweaks to the BIOS and to Windows' power settings can cut your PC power bill by more than half. |
PC World March 2006 Woody Leonard |
Vista Emphasizes Safety, Performance Improvements, and a few headaches, are evident in beta of Microsoft's new Windows. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
PC World December 2001 Kirk Steers |
Hardware Tips Make the most of your memory... play DVD movies from foreign lands... unplug PC Cards safely... |
PC World December 20, 2006 Andrew Brandt |
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. |
PC World December 7, 2007 Becky Waring |
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. |
PC Magazine June 22, 2004 Neil J. Rubenking |
Reboot into Safe Mode in Windows XP Instructions on accomplishing this reboot task. |
PC Magazine January 20, 2009 Matthew D. Sarrel |
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. |
CRM March 2, 2012 Raul Ortega |
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. |
PC World November 2000 Kirk Steers |
Windows' System Monitor Peeks Under a PC's Hood Let Windows' System Monitor keep an eye on things, quiet your modem... |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
InternetNews December 13, 2004 Sean Michael Kerner |
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
InternetNews March 7, 2011 |
How To Win Pwn2own Browser Hack Head of security research at HP's Tipping Point previews the annual hacking contest, which will take aim at all major Web browsers and mobile platforms. |
PC World February 2004 Lincoln Spector |
How Do I Keep Other People Off My PC? Use these tricks and tools to protect your files. Plus, automate PC shutdown, find out how much laser-printer memory you need, and update XP's Start menu. |
Linux Journal March 2001 Rick van Rein |
Running Linux with Broken Memory Being able to run Linux flawlessly on a machine with faulty memory that would otherwise be discarded makes a lot of sense--the BadRAM patch makes it happen... |
PC World April 3, 2002 Laura Rohde |
Are Web Sites as Secure as They Seem? Study finds that popular encryption technology isn't always enough -- and surfers may be unaware of the danger... |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
PC World April 15, 2001 |
Top 5 System Tools Free up RAM, tweak your hardware, and remove remnants of programs when you uninstall... |
InternetNews September 12, 2006 Sean Michael Kerner |
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. |
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
PC World March 20, 2007 Dunn & Spanbauer |
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. |
BusinessWeek December 22, 2003 Stephen H. Wildstrom |
Keys That Remember -- And A Lot More The newest batch of USB keys can help secure data or redo the look of a PC. |
PC Magazine September 18, 2008 Neil Randall |
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. |
American Family Physician March 1, 2003 |
Memory Loss Why am I losing my memory?... Where Can I Get More Information?... Memory Problems that Are Not Part of Normal Aging... What about when I know a word but cannot recall it?... How can I tell if my memory problems are serious?... etc. |
CIO July 15, 2001 Fred Hapgood |
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... |
InternetNews February 20, 2009 Jennifer Schiff |
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. |
Bank Technology News August 2008 Rebecca Sausner |
Laptop Encryption: Pru Tackles 15K in a Month Prudential's Vice President of Information Services discusses his choice of McAfee's Endpoint Encryption. |
PC World May 24, 2007 Christopher Null |
How to Survive the Worst PC Disasters Can't get your PC to boot? Or just sent your boss a really embarrassing e-mail? Here's how to recover from these and ten other potential catastrophes. |