MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
New Architect
January 2003
Thomas Claburn
Pretty Good Isn't Good Enough Phil Zimmermann, creator of PGP (Pretty Good Privacy) encryption, won the crypto war. Whither privacy? mark for My Articles similar articles
Salon.com
March 27, 2002
Bill Lamb
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver? mark for My Articles similar articles
PC World
July 22, 2002
Deborah Radcliff
What Does the Future Hold for PGP? Network Associates no longer supports the encryption technology, but that doesn't mean it will disappear. mark for My Articles similar articles
Macworld
August 15, 2005
Glenn Fleishman
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
PC Magazine
August 31, 2005
Ryan Naraine
Privacy pioneer promises secure VoIP Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VoIP communications. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2009
Maria Bruno-Britz
IBM Develops Technique to Enable Confidential Processing of Encrypted Data Homomorphic encryption will allow for the analysis of private data by third parties without revealing the data's content. mark for My Articles similar articles
Macworld
July 2000
Tom Negrino
Protect Your e-Mail Keep Your Private Words from Prying Eyes mark for My Articles similar articles
Macworld
April 2003
Glenn Fleishman
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
PC Magazine
December 21, 2007
Erik Rhey
Security's High Roller Once a top security consultant to Vegas casinos, Jeff Jonas is now head of IBM's Entity Analytic Solutions lab, figuring out ways to collect and store more data safely. mark for My Articles similar articles
InternetNews
May 10, 2005
Michael Singer
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products. mark for My Articles similar articles
PC World
September 2005
Andrew Brandt
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. mark for My Articles similar articles
InternetNews
June 25, 2009
Alex Goldman
IBM Claims Privacy Breakthrough for Cloud, Data Researcher Craig Gentry claims to have developed a new method for manipulating encrypted data - with major implications for data security, antispam efforts and cloud computing. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
PC World
February 10, 2003
Kyle Stock
Feds Look to Expand Electronic Surveillance Confidential proposal calls for increased monitoring of private e-mail messages, Web surfing, and other online activities. mark for My Articles similar articles
Searcher
August 2000
Josh Duberman & Michael Beaudet
Privacy Perspectives for Online Searchers: Confidentiality with Confidence This article presents some of the issues and questions involved in online privacy from the information professional's perspective. We offer it as a resource for making more informed decisions in this rapidly changing area. mark for My Articles similar articles
InternetNews
April 29, 2005
Michael Singer
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them. mark for My Articles similar articles
Linux Journal
September 2001
Mick Bauer
GPG: the Best Free Crypto You Aren't Using, Part I of II An introduction to the underappreciated, 100% free utility you didn't know you needed (but do) -- GnuPG... mark for My Articles similar articles
Reason
June 2004
Julian Sanchez
Soundbite: Probing Privacy An interview with the author of The Naked Crowd on the uncharted terrain that is privacy policy in America's digital age. mark for My Articles similar articles
PC World
September 11, 2002
Andrew Brandt
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances. mark for My Articles similar articles
BusinessWeek
August 8, 2005
Surveillance Society: The Experts Speak Excerpts from those conversations with privacy and security experts about how much security monitoring is necessary and what can be done to prevent abuses. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
Salon.com
September 14, 2001
Katharine Mieszkowski
Send in the online spooks? In the aftermath of terrorism, civil libertarians are running for cover. But are they protesting too much? mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
PC World
November 7, 2006
Andrew Brandt
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. mark for My Articles similar articles
InternetNews
February 22, 2006
Roy Mark
Tech Inadvertently Helps Spy Game A new report claims that popular services such as Webmail are eroding U.S. privacy laws. mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
Reason
November 2003
Wendy M. Grossman
The Spam Wars How should the Internet deal with junk mail? mark for My Articles similar articles
PC Magazine
February 17, 2004
Cade Metz
Can E-Mail Survive? It faces increasing threats from spam, viruses and outdated protocols. Here's what you need to survive. mark for My Articles similar articles
Entrepreneur
November 2004
Liane Cassavoy
Hot Disks 11/04 Pain-Free Patching... Spam Stopper... Get Organized... Share Safely... mark for My Articles similar articles
InternetNews
May 25, 2010
Google Tests Encrypted Search The beta of Google's encrypted search site is available for users to try out. Will it prove to be more useful with the popularity of mobile Internet use? mark for My Articles similar articles
Reason
April 2009
Katherine Mangu-Ward
State of Insecurity Interview with Bruce Schneier, the go-to guy for fresh ideas about all kinds of digital and physical security issues. mark for My Articles similar articles
PC World
June 1, 2000
Matt Lake
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. mark for My Articles similar articles
PC World
March 2, 2001
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... mark for My Articles similar articles
PC World
September 2002
Andrew Brandt
Privacy Watch: Just Say 'No' to Spam -- Again Sudden changes in some Web sites' policies can open the doors to spam. mark for My Articles similar articles
Entrepreneur
July 2004
Catherine Seda
Spam Uncanned Is the Can-Spam legislation reducing unsolicited e-mail? Not according to a February 2004 survey by the Pew Internet & American Life Project. mark for My Articles similar articles
Popular Mechanics
October 20, 2008
John Brownlee
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
Popular Mechanics
July 2008
Joel Johnson
How to Stop Your Boss From Spying on Your Company E-mail Want to keep the IT guys from casually snooping on your dinner plans? Here are a few ways to beef up your in-office digital privacy. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
InternetNews
June 23, 2006
Ed Sutherland
AT&T Draws Ire Over Privacy Update Privacy policy clarifications come as AT&T heads back into court. mark for My Articles similar articles
InternetNews
June 11, 2004
Susan Kuchinskas
Microsoft Building 'Safer Search' Microsoft is working on creating "safer search" technology as it puts the finishing touches on refinements to Internet Explorer. mark for My Articles similar articles
Technology Research News
September 19, 2005
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals. mark for My Articles similar articles
PC World
January 31, 2002
Jim Welp
Spam Begone Eating more spam than ever? Here's how to keep junk e-mail from ruling your in-box... mark for My Articles similar articles
Reason
April 2001
Jennifer DePalma
Surfing Secrets The meanings of online privacy are multiple, and few authors present the facts and lay out the issues in a way that lets laypeople develop an informed opinion. Charles Jennings and Lori Fena's The Hundredth Window is, for the most part, an exception... mark for My Articles similar articles