MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Macworld
August 15, 2005
Glenn Fleishman
PGP Desktop Home 9 PGP Desktop Home 9 provides effortless, high-level security, rules-based e-mail encryption, and a much improved interface. For the audience that PGP applies to, this program has never been more useful or relevant -- or less intrusive. mark for My Articles similar articles
Macworld
April 2003
Glenn Fleishman
PGP Personal 8.0 PGP Personal 8.0 for OS X takes a direct approach to safeguarding your sensitive information: encrypting e-mail messages and files so that only you and your chosen recipients can read them. mark for My Articles similar articles
PC World
November 7, 2006
Andrew Brandt
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. mark for My Articles similar articles
InternetNews
May 10, 2005
Michael Singer
PGP: Extended Encryption For Compliance PGP Corporation's significant upgrade extends to an integrated suite of desktop and gateway security products. mark for My Articles similar articles
PC World
September 2005
Andrew Brandt
PGP Desktop 9 Delivers a Sweet Security Suite Reasonably priced encryption software effectively guards your personal data. mark for My Articles similar articles
PC Magazine
April 24, 2007
Neil J. Rubenking
SecureZIP Standard Version 11 SecureZIP manages ZIP files as well as public-key cryptography and e-mail security. mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
May 11, 2007
Andy Patrizio
Intel, PGP In Security Hookup Intel and PGP have announced a partnership to sell encryption products on systems with Centrino Pro and vPro technologies. mark for My Articles similar articles
PC World
July 22, 2002
Deborah Radcliff
What Does the Future Hold for PGP? Network Associates no longer supports the encryption technology, but that doesn't mean it will disappear. mark for My Articles similar articles
Macworld
July 2000
Tom Negrino
Protect Your e-Mail Keep Your Private Words from Prying Eyes mark for My Articles similar articles
InternetNews
April 2, 2007
Andy Patrizio
PGP Adds Vista, USB Drive Encryption Support PGP Corp. has given its PGP Encryption Platform a boost by adding support for new platforms, applications and expanding encryption support to other potential areas of vulnerability. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles similar articles
PC World
December 20, 2006
Andrew Brandt
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. mark for My Articles similar articles
Salon.com
March 27, 2002
Bill Lamb
Pretty geeky privacy More and more people want powerful, easy-to-use encryption software, but the commercial world isn't providing it. Can open source deliver? mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
Linux Journal
September 2001
Mick Bauer
GPG: the Best Free Crypto You Aren't Using, Part I of II An introduction to the underappreciated, 100% free utility you didn't know you needed (but do) -- GnuPG... mark for My Articles similar articles
PC Magazine
June 13, 2011
Eric Griffith
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
PC World
March 20, 2007
Dunn & Spanbauer
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
PC Magazine
June 16, 2009
Eric Griffith
2009 Windows Utility Guide Browse our largest-ever collection of utilities to install on Windows XP and Vista (and, in some cases, even Windows 7) and you'll find the functions you need at prices you'll like. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
PC Magazine
February 2, 2005
David A. Karp
Save and Protect Your Hard Drive You can prepare for disaster by taking steps now to protect your PC's most valuable asset: its hard drive. mark for My Articles similar articles
PC World
August 2004
Jeff Bertolucci
Products for the Paranoid Fingerprint scanners, security keys, encryption software: Which tools should you use to keep sensitive data from prying eyes? mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
PC Magazine
May 4, 2005
Sarah Pike
2005 Utility Guide Spend any time with your PC and you'll quickly realize that man cannot live by Windows (and Office, and a browser) alone. mark for My Articles similar articles
Bank Systems & Technology
July 28, 2006
Encrypting From the Inside Northern Trust Images Checks With Fiserv... Largest Worldwide Core Banking Deployment... Fremont Bank Launches E-Mortgage Solution... mark for My Articles similar articles
InternetNews
March 12, 2007
Andy Patrizio
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. mark for My Articles similar articles
PC Magazine
May 18, 2004
Bill Machrone
Secure Instant Messaging Here's how to keep IM conversations safe at work. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
PC World
March 2, 2001
Top 5 Encryption Utilities Protect your hard drive from prying eyes with these downloads... mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
Popular Mechanics
October 20, 2008
John Brownlee
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
BusinessWeek
December 22, 2003
Stephen H. Wildstrom
Keys That Remember -- And A Lot More The newest batch of USB keys can help secure data or redo the look of a PC. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
PC World
June 1, 2000
Matt Lake
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
InternetNews
February 22, 2008
Andy Patrizio
Laptop Encryption Has a Point of Weakness Researchers find a way to get at disk encrypted passwords under the right circumstances. mark for My Articles similar articles
JavaWorld
August 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
PC Magazine
October 14, 2003
Leon Erlanger
Hot-Spot Hazards Wireless hot spots are all the rage, but their lack of encryption means your sensitive information may be visible to anyone. Don't connect before following our suggestions. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles