For more than a decade, the United States government classified encryption technology as a weapon. Now that label might actually apply. Security-consulting firm ...
Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. Read now Most ...
Although I’ve yet to see the one product that can encrypt data on all OSes and media, PGP’s suite of encryption products offers a competitive enterprise solution to protect a variety of content on ...
So, we will soon have an account at our business that is going to require extra security compared to the normal security (domain users can access, some can write/modify).<BR><BR>This is a file where I ...
I can get ahold of all the files again in a slow, monotonous fashion of searching, copying, etc... but, perhaps I can decrypt them out of this file if I can get it to work.<BR><BR>OR.... is there a ...
In our previous installment in the encryption series, we looked at how you could encrypt your files using PGP. Apps that use the PGP technology have several advantages over other encryption ...
Networked computing is a double-edged sword. Connectivity makes transparent sharing of data through e-mail, Web sites, and ftp archives possible, but it also invites unwanted access to your data.
FileAssurity Open PGP is designed to be a low-cost alternative to PGP, while retaining full compatibility with PGP. With it, you can generate, import and export X.509 and PGP keys and it also supports ...