MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
JavaWorld
February 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. mark for My Articles similar articles
JavaWorld
April 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 4 A tour of authentication from the X.509 perspective and the steps necessary for verifying a chain of X.509 certificates... mark for My Articles similar articles
JavaWorld
January 2001
Todd Sundsted
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... mark for My Articles similar articles
JavaWorld
December 2001
Raghavan N. Srinivas
Java security evolution and concepts, Part 5 This article introduces J2SE (Java 2 Platform, Standard Edition) 1.4's new security packages for certificate chain manipulation, along with Generic Security Services, which includes a single sign-on framework over the network. mark for My Articles similar articles
PC World
March 22, 2001
Cameron Crouch
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... mark for My Articles similar articles
InternetNews
December 31, 2003
Susan Kuchinskas
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? mark for My Articles similar articles
Information Today
September 29, 2015
Abby Clobridge
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. mark for My Articles similar articles
U.S. CPSC
November 12, 2008
CPSC Clarifies Certification Requirements: Agency Staff to Focus on Compliance with Safety Rules The U.S. Consumer Product Safety Commission issued a final rule by unanimous vote, addressing the conformity certification required for consumer products subject to safety rules under CPSC jurisdiction. mark for My Articles similar articles
InternetNews
December 15, 2004
Michael Singer
RosettaNet Fights Fraud With New Certificates E-business standards consortium RosettaNet said it has a new tool in the fight against online fraud. The fraud prevention algorithms are designed for all e-business applications and messaging standards. mark for My Articles similar articles
PC Magazine
March 7, 2008
David Cardinal
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. mark for My Articles similar articles
PC World
October 24, 2007
Erik Larkin
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. mark for My Articles similar articles
Fast Company
Glenn Fleishman
The Worst Thing About Lenovo's Adware Isn't The Adware Full understanding of what happened requires further explanation by Lenovo. But even the least alarming scenario is a great big deal. mark for My Articles similar articles
InternetNews
March 24, 2011
Iran May Have Attacked the Web In an attack last week, valid security certificates that could have been used to mount attacks on users worldwide. mark for My Articles similar articles
PC Magazine
May 18, 2004
Bill Machrone
Secure Instant Messaging Here's how to keep IM conversations safe at work. mark for My Articles similar articles