MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
PC Magazine
November 14, 2007
Neil J. Rubenking
Big SYS Files Are Okay They take up a lot of hard drive space, and you're not so sure what they do. But is it safe to delete those .sys files? mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
September 13, 2007
Andy Patrizio
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." mark for My Articles similar articles
InternetNews
December 11, 2007
Paul Shread
nCipher Scoops Up NeoScale nCipher has acquired the assets of NeoScale Systems after the storage security vendor wound down operations. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
InternetNews
March 12, 2007
Andy Patrizio
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
Bank Systems & Technology
June 1, 2004
George V. Hulme
Ingrian Networks Helps Union Bank Protect Customer Data Better Vendor's DataSecure platform boosts bank's encryption capabilities and improves key management. mark for My Articles similar articles
PC World
September 26, 2007
Scott Mueller
Reduce Your PC's Power and Operating Costs A few simple tweaks to the BIOS and to Windows' power settings can cut your PC power bill by more than half. mark for My Articles similar articles
PC World
March 2006
Woody Leonard
Vista Emphasizes Safety, Performance Improvements, and a few headaches, are evident in beta of Microsoft's new Windows. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
PC World
December 2001
Kirk Steers
Hardware Tips Make the most of your memory... play DVD movies from foreign lands... unplug PC Cards safely... mark for My Articles similar articles
PC World
December 20, 2006
Andrew Brandt
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
PC Magazine
June 22, 2004
Neil J. Rubenking
Reboot into Safe Mode in Windows XP Instructions on accomplishing this reboot task. mark for My Articles similar articles
PC Magazine
January 20, 2009
Matthew D. Sarrel
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
PC World
November 2000
Kirk Steers
Windows' System Monitor Peeks Under a PC's Hood Let Windows' System Monitor keep an eye on things, quiet your modem... mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
InternetNews
March 7, 2011
How To Win Pwn2own Browser Hack Head of security research at HP's Tipping Point previews the annual hacking contest, which will take aim at all major Web browsers and mobile platforms. mark for My Articles similar articles
PC World
February 2004
Lincoln Spector
How Do I Keep Other People Off My PC? Use these tricks and tools to protect your files. Plus, automate PC shutdown, find out how much laser-printer memory you need, and update XP's Start menu. mark for My Articles similar articles
Linux Journal
March 2001
Rick van Rein
Running Linux with Broken Memory Being able to run Linux flawlessly on a machine with faulty memory that would otherwise be discarded makes a lot of sense--the BadRAM patch makes it happen... mark for My Articles similar articles
PC World
April 3, 2002
Laura Rohde
Are Web Sites as Secure as They Seem? Study finds that popular encryption technology isn't always enough -- and surfers may be unaware of the danger... mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
PC World
April 15, 2001
Top 5 System Tools Free up RAM, tweak your hardware, and remove remnants of programs when you uninstall... mark for My Articles similar articles
InternetNews
September 12, 2006
Sean Michael Kerner
IBM Encrypts The Key to Privacy IBM today officially announced new encryption technology and services that claim to provide "end-to-end" protection of customer data stored on IBM tape drives. mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
PC World
March 20, 2007
Dunn & Spanbauer
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. mark for My Articles similar articles
BusinessWeek
December 22, 2003
Stephen H. Wildstrom
Keys That Remember -- And A Lot More The newest batch of USB keys can help secure data or redo the look of a PC. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
American Family Physician
March 1, 2003
Memory Loss Why am I losing my memory?... Where Can I Get More Information?... Memory Problems that Are Not Part of Normal Aging... What about when I know a word but cannot recall it?... How can I tell if my memory problems are serious?... etc. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
Bank Technology News
August 2008
Rebecca Sausner
Laptop Encryption: Pru Tackles 15K in a Month Prudential's Vice President of Information Services discusses his choice of McAfee's Endpoint Encryption. mark for My Articles similar articles
PC World
May 24, 2007
Christopher Null
How to Survive the Worst PC Disasters Can't get your PC to boot? Or just sent your boss a really embarrassing e-mail? Here's how to recover from these and ten other potential catastrophes. mark for My Articles similar articles