MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
June 13, 2011
Eric Griffith
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. mark for My Articles similar articles
PC World
March 20, 2007
Dunn & Spanbauer
The Simple Way to Keep Your Private Files Private Make encrypted files stand out, control access to secure files, and a freebie turns folders invisible. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
PC World
November 7, 2006
Andrew Brandt
First Look: PGP Whole Disk Encryption 9.5 and SecurStar DriveCrypt Plus Pack 3.5 Encryption apps keep your sensitive data safe. mark for My Articles similar articles
PC Magazine
October 1, 2003
Cade Metz
Total Security To help you protect not only your PC and notebook but also your PDA from serious hackers, bored script kiddies, thieves, viruses, spyware, nosy employers, and even jealous spouses, we give you an all-encompassing overview of the computer security market. mark for My Articles similar articles
Financial Advisor
March 2012
Joel P. Bruckenstein
Secure Your Content SafeSync for Business provides a way to securely share and access your firm's data online. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
PC Magazine
July 29, 2005
Neil J. Rubenking
CallingID CallingID service helps protect users from phishing scams... CBL Data Shredder... Cryptainer LE 6.0... Anfibia Deskman SE 6... DESLock+... SecureWave Sanctuary Device Control 3.0... ESET NOD32... Winferno Software PC Confidential... SpamBully... mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
Macworld
July 2000
Tom Negrino
Protect Your e-Mail Keep Your Private Words from Prying Eyes mark for My Articles similar articles
PC World
December 20, 2006
Andrew Brandt
Don't Discard Your Privacy Along With Old Drives When disposing of old drives and discs, be sure to destroy the data they hold. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
PC Magazine
September 18, 2008
Neil Randall
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. mark for My Articles similar articles
PC Magazine
September 21, 2005
Neil J. Rubenking
PGP Desktop Pro 9 PGP Desktop Pro 9 makes public-key cryptography available to everyone. mark for My Articles similar articles
PC World
August 25, 2006
Narasu Rebbapragada
Encryption Apps Keep Files From Prying Eyes DESLock+, Namo FileLock, and T3 Basic Security all promise to lock down your personal data. mark for My Articles similar articles
Information Today
May 1, 2014
Folder Lock App Update Goes Live New Softwares.net updated its Folder Lock file-security application to version 7.2.6. mark for My Articles similar articles
PC Magazine
January 20, 2009
Matthew D. Sarrel
Smartphone Security Measures Even the simplest cell phones carry enough data to be dangerous in the wrong hands. mark for My Articles similar articles
PC World
June 1, 2000
Matt Lake
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. mark for My Articles similar articles
PC World
December 7, 2007
Becky Waring
Lock Down the Data on Your Portable Drives New hardware and software simplify the task of keeping your sensitive information safe from data thieves. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
Popular Mechanics
October 20, 2008
John Brownlee
Keep Your Data Safe Online: Complete Guide to Online Privacy Though we can't promise that these tips will keep you 100 percent safe from hackers, they'll certainly make it a lot harder for interlopers to read your e-mail, fill your computer with spyware and track your Web-surfing habits. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
PC Magazine
January 20, 2004
M. David Stone
Making the Best of WEP Wired Equivalent Privacy is a weak security scheme for wireless networks. Here are some tips to make it harder to break through WEP if you don't want to upgrade to hardware that offers better security. mark for My Articles similar articles
Information Today
November 4, 2014
DataNumen Offers Free Password-Recovery Tool DataNumen, Inc. released a free Windows-based utility, DataNumen Outlook Password Recovery, which recovers passwords from encrypted Outlook files. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
PC World
November 22, 2006
Lincoln Spector
Answer Line: Keep Your Secrets: A Safe, Easy Way to Encrypt Files Set up an encrypted safe in your PC... Customize your Office dialog boxes... Printing your screen... A tool to track your security updates... mark for My Articles similar articles
Information Today
May 9, 2011
Wall Street Journal Launches 'SafeHouse' Submission Site SafeHouse is a stand-alone site located on secure servers and managed directly by Journal editors. Users can submit materials along with their contact information or remain anonymous. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
This Old House
Megan Baker
5 Ways to Clean Up Your E-Clutter Clutter-proof your electronic files with these easy tips. mark for My Articles similar articles
PC Magazine
January 1, 2008
John Brandon
Secure Your Word Docs Before sending cover letters to clients or financial summaries to the boss sign your documents and use encryption and passwords to protect their privacy. mark for My Articles similar articles
Investment Advisor
June 1, 2011
Dan Skiles
Ten Easy--And Cheap--Tech Tips to Improve Efficiency From best practices to technical assistance, these tips can help advisors run their office more efficiently. mark for My Articles similar articles
Financial Advisor
June 2006
David L. Lawrence
Is Your Data Secure? Effective -- and cost-efficient -- tools to help your computer system keep its secrets. Adobe Acrobat Professional version 7.0... Tritton Simple NAS... Beyond Micro BME3.5 external enclosure... Winmagic MySecureDoc Personal Edition... etc. mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
InternetNews
September 13, 2007
Andy Patrizio
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." mark for My Articles similar articles
JavaWorld
August 2002
Ray Djajadinata
Yes, you can secure your Web services documents, Part 1 This article discusses XML Encryption, an important technology in the Web services security realm. The article explains what it is, why savvy Java programmers should understand it, and how to implement the technology using IBM's XML Security Suite. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
InternetNews
August 4, 2006
Sean Michael Kerner
Browser Cache: Goodies For Hackers Black Hat session reveals that it's not just Trojans and keyloggers you should watch out for. mark for My Articles similar articles
PC World
August 2004
Jeff Bertolucci
Products for the Paranoid Fingerprint scanners, security keys, encryption software: Which tools should you use to keep sensitive data from prying eyes? mark for My Articles similar articles
PC World
May 2001
Brad Grimes
Privacy Matters Marketers would love to find out all about you and your online activities. But what personal data should you let them obtain? We report on recent developments in Net surveillance and their effect on you... mark for My Articles similar articles
PC World
February 8, 2001
Cameron Crouch
Tips for Keeping a Leash on Your PDA's Data Built-in and third-party security tools can help protect your PDA, even if you let it out of your hands... mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
PC World
May 2005
Andrew Brandt
Do Passwords Provide True Protection? Don't Count on It Here are tools that protect your data and computer when your passwords don't. mark for My Articles similar articles
Technology Research News
December 17, 2003
Hybrid crypto secures images Researchers from National Chung Cheng University and National Yunlin University of Science and Technology in Taiwan have devised a way to encrypt in a single communication an image and the secret session key that unlocks the image. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
PC World
November 2005
Andrew Brandt
Portable Drives That Protect Your Data CryptoStick... Kanguru Micro Drive AES... Kanguru Bio Drive... SanDisk Cruzer Profile Biometric... mark for My Articles similar articles
PC Magazine
November 30, 2005
Neil J. Rubenking
Managing Password Manager How to prevent the Password Manager from automatically entering a password within Firefox after you have given it permission to do so. mark for My Articles similar articles