MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
JavaWorld
April 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... mark for My Articles similar articles
JavaWorld
February 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. mark for My Articles similar articles
JavaWorld
March 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
PC World
March 22, 2001
Cameron Crouch
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... mark for My Articles similar articles
InternetNews
December 31, 2008
Richard Adhikari
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. mark for My Articles similar articles
JavaWorld
December 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 5 This article introduces J2SE (Java 2 Platform, Standard Edition) 1.4's new security packages for certificate chain manipulation, along with Generic Security Services, which includes a single sign-on framework over the network. mark for My Articles similar articles
Fast Company
Glenn Fleishman
The Worst Thing About Lenovo's Adware Isn't The Adware Full understanding of what happened requires further explanation by Lenovo. But even the least alarming scenario is a great big deal. mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
InternetNews
December 30, 2008
Richard Adhikari
Certificate Flaw May Threaten Secure Web Sites Researchers say they've found a weakness in a common cryptography technology used in the digital certificates that protect many secure online transactions. mark for My Articles similar articles
InternetNews
July 30, 2009
Kaminsky Warns of SSL Vulnerabilities Security researcher Dan Kaminsky made waves last year with his dramatic DNS security flaw that could have undermined the security of the Internet. This year at Black Hat, he's back with another critical issue affecting the security certificates that secure Web sites. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. mark for My Articles similar articles
InternetNews
December 15, 2004
Michael Singer
RosettaNet Fights Fraud With New Certificates E-business standards consortium RosettaNet said it has a new tool in the fight against online fraud. The fraud prevention algorithms are designed for all e-business applications and messaging standards. mark for My Articles similar articles
JavaWorld
August 2001
Todd Sundsted
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... mark for My Articles similar articles
InternetNews
July 9, 2004
Sean Michael Kerner
GeoTrust vs. VeriSign: An SSL Controversy Survey results ignite debate over who has the biggest chops in the SSL certificate arena. mark for My Articles similar articles
InternetNews
December 31, 2003
Susan Kuchinskas
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? mark for My Articles similar articles
U.S. CPSC
November 12, 2008
CPSC Clarifies Certification Requirements: Agency Staff to Focus on Compliance with Safety Rules The U.S. Consumer Product Safety Commission issued a final rule by unanimous vote, addressing the conformity certification required for consumer products subject to safety rules under CPSC jurisdiction. mark for My Articles similar articles
InternetNews
July 20, 2009
How Did Symbian OK Mobile Phone Malware? The Symbian mobile OS is used by millions of phones globally and thanks to a (now corrected) oversight they could have potentially installed malware - with Symbian's approval. mark for My Articles similar articles
InternetNews
March 24, 2011
Iran May Have Attacked the Web In an attack last week, valid security certificates that could have been used to mount attacks on users worldwide. mark for My Articles similar articles
CIO
October 15, 2000
J. Brown
Emerging Technology Digitally signed documents could streamline business processes... mark for My Articles similar articles
InternetNews
December 16, 2005
Sean Michael Kerner
Who is The SSL Certification Leader? GeoTrust said this week that it is growing faster than anyone else. And then VeriSign said it is the undisputed leader in the SSL certificate market. mark for My Articles similar articles
IEEE Spectrum
January 2009
Monica Heger
Cryptographers Take On Quantum Computers Researchers prepare for the day when quantum computers can easily crack today's codes. mark for My Articles similar articles
PC Magazine
May 18, 2004
Bill Machrone
Secure Instant Messaging Here's how to keep IM conversations safe at work. mark for My Articles similar articles
New Architect
August 2002
Al Williams
Unsafe At Any Speed? C#'s relaxed security model may not be the best fit for your business. mark for My Articles similar articles
PC Magazine
October 5, 2004
Neil J. Rubenking
Security Certificates Suddenly Invalid I have a glitch in Internet Explorer 6 that seems to have come out of nowhere. mark for My Articles similar articles
Technology Research News
September 19, 2005
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals. mark for My Articles similar articles
PC World
August 19, 2002
John Fontana
Debate Flares Over Microsoft's SSL Glitch Software giant says flaw would be difficult to exploit, but some security experts disagree. mark for My Articles similar articles
OCC Bulletin
August 31, 2004
Tax Lien Certificates Description This document describes the risk management practices that the Office of the Comptroller of the Currency expects banks to exercise when purchasing tax lien certificates. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
InternetNews
June 28, 2010
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? mark for My Articles similar articles
IEEE Spectrum
November 2008
Q&A With Post-Quantum Computing Cryptography Researcher Jintai Ding Quantum computers may be the perennial "computer of the future," but if (or when) they do become a reality, their sheer power could threaten the security of our information-technology infrastructure. mark for My Articles similar articles
PC Magazine
April 24, 2007
Neil J. Rubenking
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security. mark for My Articles similar articles
Popular Mechanics
February 2007
Joel Johnson
Secure Sockets Layer Explained: Tech Clinic What Secure Sockets Layer (SSL) is and how it works to secure Internet transactions. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
InternetNews
February 15, 2006
Erin Joyce
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
IEEE Spectrum
April 2008
Saswato R. Das
Quantum Cryptography Cracked? Swedes find vulnerability in supposedly secure quantum cryptography system. mark for My Articles similar articles
PC World
August 13, 2002
David Legard
Severe Security Flaw Found in IE Microsoft acknowledges potential SSL vulnerability, uncovered by security researcher. mark for My Articles similar articles
The Motley Fool
August 29, 2006
Taking a Tax Loss A silver lining for loser stocks: They can lower your tax bill. mark for My Articles similar articles
Macworld
April 2003
Glenn Fleishman
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Security Company's Cryptography Play Aims At Tech Firms, Finance Dyadic says even if a system is breached and attackers get access to some credentials, other credentials will instantly become inaccessible. mark for My Articles similar articles
Registered Rep.
March 1, 2005
Janet Wynn
Paper Torture Why does today's securities industry, which uses some of the most sophisticated technology available, still issue and distribute equities the same way it did two centuries ago --- as pieces of paper? mark for My Articles similar articles
PC World
August 15, 2002
John Fontana
Microsoft: SSL Flaw in Windows, Not IE Researchers said browser was insecure, but now software giant says it's the OS that must be patched. mark for My Articles similar articles
JavaWorld
April 2002
Snehal Patel
Navigate data with the Mapper framework Whether you must read records from a text file and write to a database table, or read from an enterprise information architecture and write to a Web service, information exchange becomes effortless using this simple design pattern... mark for My Articles similar articles
The Motley Fool
January 15, 2004
Selena Maranjian
What to Do With Worthless Stock Sell it, even for a penny. mark for My Articles similar articles
IEEE Spectrum
October 2008
Saswato R. Das
"Mother of All Quantum Networks" Unveiled in Vienna EU-sponsored quantum-cryptography network unparalleled in size and complexity mark for My Articles similar articles