MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
June 17, 2010
VeriSign Corners SSL Certification The latest market share figures from Netcraft show VeriSign's made significant gains. But the report also shows why the SSL market is hard to quantify. mark for My Articles similar articles
Popular Mechanics
February 2007
Joel Johnson
Secure Sockets Layer Explained: Tech Clinic What Secure Sockets Layer (SSL) is and how it works to secure Internet transactions. mark for My Articles similar articles
RootPrompt.org
June 5, 2000
Jeremey Barrett
A Response to the feature on IPv6 vs. SSL SSL and other transport-layer protocols provide additional and different security functionality that IPsec (and hence IPv6) will never provide.... mark for My Articles similar articles
Salon.com
August 8, 2000
Katharine Mieszkowski
Are those servers really safe? A study finds that one-third of so-called secure Web sites are actually "dangerously" vulnerable. mark for My Articles similar articles
New Architect
May 2002
Logan G. Harbaugh
SSL Accelerators To increase a Web site's ability to handle SSL transactions, as well as to reduce processor overhead, it makes sense to offload SSL processing from the server to dedicated hardware... mark for My Articles similar articles
InternetNews
May 6, 2005
Erin Joyce
Bob Weinschenk, CEO, Britestream And here's the pitch: The time has come for offloading online security from the software side to the hardware side of the network. mark for My Articles similar articles
InternetNews
December 13, 2004
Sean Michael Kerner
Postini Extends E-Mail Boundaries E-mail security services vendor Postini is launching a new service today that it expects will process more than 30 million encrypted messages per day. mark for My Articles similar articles
InternetNews
December 16, 2005
Sean Michael Kerner
Who is The SSL Certification Leader? GeoTrust said this week that it is growing faster than anyone else. And then VeriSign said it is the undisputed leader in the SSL certificate market. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
InternetNews
July 29, 2010
Researcher Warns Most Sites Get SSL Wrong At Black Hat, security researcher presents his latest work demonstrating the widespread misconfiguration of websites that implement SSL protection. mark for My Articles similar articles
InternetNews
December 30, 2008
Richard Adhikari
Certificate Flaw May Threaten Secure Web Sites Researchers say they've found a weakness in a common cryptography technology used in the digital certificates that protect many secure online transactions. mark for My Articles similar articles
PC World
August 15, 2002
John Fontana
Microsoft: SSL Flaw in Windows, Not IE Researchers said browser was insecure, but now software giant says it's the OS that must be patched. mark for My Articles similar articles
InternetNews
July 20, 2004
Ryan Naraine
MasterCard, Others Plug Script Injection Leak Credit card giant MasterCard is among many online financial institutions rushing to fix Web site design security flaws. mark for My Articles similar articles
InternetNews
July 21, 2010
VeriSign to Add Malware Scanning to SSL Scanning service is designed to enhance the security of SSL certificates. mark for My Articles similar articles
JavaWorld
May 2001
Todd Sundsted
Build secure network applications with SSL and the JSSE API SSL (Secure Socket Layer) is the de facto standard for securing a communication channel between two applications that converse over the Internet. Sun's JSSE (Java Secure Socket Extension) provides SSL support for Java applications... mark for My Articles similar articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
PC Magazine
August 19, 2003
Simpler, Safe Remote Access Remote access via SSL (Secure Sockets Layer), the focus of our product roundup, is relatively new, but it's growing quickly because of its simplicity for users and its accessibility from any PC with an Internet connection and browser, anywhere. mark for My Articles similar articles
PC World
August 19, 2002
John Fontana
Debate Flares Over Microsoft's SSL Glitch Software giant says flaw would be difficult to exploit, but some security experts disagree. mark for My Articles similar articles
InternetNews
August 4, 2009
Mozilla Patches Firefox for Black Hat Flaws Firefox 3.5.2 and 3.0.13 fix issues new and old in the open source browser. mark for My Articles similar articles
Fast Company
Chris Gayomali
All Your Most Pressing Heartbleed Questions Answered Heartbleed is the devastating two-year-old bug that was only revealed Monday. It is quickly snowballing into the single biggest security vulnerability in Internet history. Here's what you need to know about it mark for My Articles similar articles
Linux Journal
October 9, 2001
Eric Rescorla
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Server Rack -- Don't Forget Physical Security Make sure that your server is secure enough that someone can't walk in and carry it out without much work. mark for My Articles similar articles
InternetNews
August 3, 2009
Sean Michael Kerner
Update Your App, Get Pwnd New research identifies weaknesses in update mechanisms for hundreds of popular applications. mark for My Articles similar articles
CIO
October 1, 2003
Lorraine Cosgrove Ware
By the Numbers It's not just what you send, it's what you store that needs encryption. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Security Company's Cryptography Play Aims At Tech Firms, Finance Dyadic says even if a system is breached and attackers get access to some credentials, other credentials will instantly become inaccessible. mark for My Articles similar articles
InternetNews
September 16, 2004
Sean Michael Kerner
Research: SSL VPN's Set to Grow Growth in secure sockets layer certification seen as one driver in the shift. mark for My Articles similar articles
InternetNews
May 25, 2010
Google Tests Encrypted Search The beta of Google's encrypted search site is available for users to try out. Will it prove to be more useful with the popularity of mobile Internet use? mark for My Articles similar articles
InternetNews
July 9, 2004
Sean Michael Kerner
GeoTrust vs. VeriSign: An SSL Controversy Survey results ignite debate over who has the biggest chops in the SSL certificate arena. mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
InternetNews
May 17, 2006
Clint Boulton
VeriSign Puts Faith in GeoTrust VeriSign agreed to purchase smaller rival GeoTrust for $125 million in cash. mark for My Articles similar articles
PC World
March 1, 2002
Joris Evers
PHP Security Flaws Widespread on the Web Scripting language could leave as many as 1 million Web sites vulnerable to attack, researcher says... mark for My Articles similar articles
InternetNews
June 28, 2010
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? mark for My Articles similar articles
InternetNews
March 15, 2005
Sean Michael Kerner
Fedora Tops Charts in Growth Rate But Red Hat still tops list in Linux Web server deployments. mark for My Articles similar articles
InternetNews
October 28, 2008
Richard Adhikari
Enterprises Still Lax on Storage Security Encrypting backup tapes is a good way to prevent data losses, but few companies do this correctly - or know where to store their encryption keys. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
InternetNews
March 3, 2009
Sean Michael Kerner
EV-SSL Turns Two. Are You Buying? Extended Validation SSL was supposed to make browsing more secure. Did it? mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
InternetNews
February 23, 2010
VeriSign Debuts Online Seal of Buying Safety The Internet's hallmark for trusted sites rolls out a new mark signifying that a site is free from malware, aimed at Websites that don't require SSL. mark for My Articles similar articles
Technology Research News
September 19, 2005
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals. mark for My Articles similar articles
InternetNews
February 22, 2008
Andy Patrizio
Laptop Encryption Has a Point of Weakness Researchers find a way to get at disk encrypted passwords under the right circumstances. mark for My Articles similar articles
InternetNews
May 19, 2006
Sean Michael Kerner
Calif. Court Certifies Class Action Vs. VeriSign Plaintiffs allege that they were mislead about VeriSign's SSL certificates. mark for My Articles similar articles
Bio-IT World
September 2005
Salvatore Salamone
University of Calgary Medical School Adopts Xythos Solution With the Web-based software, Xythos Enterprise Document Manager, the MedIT group set up a file sharing and transfer service called the Secure WebFile that combines access control, file version control and management, and browser-based SSL (secure sockets layer) encryption. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
November 14, 2007
Christopher Saunders
VeriSign Sheds Businesses in Bid to Refocus DNS and SSL will comprise the company's backbone as execs seek to rein in a sprawling organization. mark for My Articles similar articles
InternetNews
August 2, 2007
Sean Michael Kerner
Web Services Secure But Flawed Security researcher argues that most Web Services security implementations are vulnerable to attack, and he shows a Black Hat audience exactly where to look. mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
InternetNews
June 15, 2009
Sean Michael Kerner
Most Users Can't Spot a Phishing Site A new report for VeriSign finds that almost nine out of ten Internet users can't tell if they're on a faked site. mark for My Articles similar articles
CIO
January 15, 2003
Susannah Patton
Simply Secure Communications VPN alternatives provide safe connections, ease and flexibility. mark for My Articles similar articles