Encryption

  • Private and Encrypted Email with Trend Micro Encryption

    Exchanging safe, secure e-mail messages is easy with the help of the right e-mail program. No special knowledge or training is needed to use this popular software, but will it help keep your messages private?
    By Donna Buenaventura September 7, 2011 

  • How to Easily Create Hashes and Checksums Online

    www.HashSum.com is the best online hash value and checksum calculator supporting popular algorithms such as MD5, secure SHA-1 hash and CRC-32. Read on to find out more about www.hashsum.com.
    By Mark Muller August 16, 2011 

  • Popular Methods of Securing Computer Information with Cryptography

    Cryptography is the study and practice of hiding information. There are a few examples of cryptography that are used in business and government to help prevent unwanted disclosure of messages and other types of information. Find out information on the...
    By Sheila Robinson August 9, 2011 


  • AES Encryption Explained in a Nutshell

    Here’s all you want to know about AES Encryption, the Advanced Encryption Standard which implements symmetric cryptography by means Rijndael algorithm in key lengths of 128, 192 and 256 bits.
    By Mark Muller August 8, 2011 

  • Understanding the Difference between Symmetric and Asymmetric Encryption

    Here all you want to know symmetric encryption and asymmetric encryption, the fundamental types of encryption schemes. This article also features stream ciphers, blocks ciphers and, for instance, sheds a light on Public Key Cryptography.
    By Mark Muller August 8, 2011 

  • The Differences between Twofish and Blowfish Encryption in a Nutshell

    Here’s all you want to know about Bruce Schneier’s Blowfish encryption as well as all about Twofish, an AES finalist, and successor of Blowfish. Both, Blowfish and Twofish, are absolutely free symmetric encryption algorithm operating a variety...
    By Mark Muller August 8, 2011 


  • Can AES Encryption be Cracked?

    Apart from social engineering exist two ways to break an encryption key like AES, brute force and cryptanalysis. Find out here whether AES encryption can be cracked any time soon, along with the latest AES development and recommendations from IT security...
    By Mark Muller August 8, 2011 

  • Why Comodo SecureEmail is Best

    Comodo SecureEmail is an innovative software making top email encryption easier, and thus safer. In this article you find all what you want to know about the top-notch Comodo SecureEmail 2.0 including valuable tips.
    By Mark Muller August 8, 2011 

  • State-of-the-art Disk Encryption with Comodo

    Here in our review of Comodo Disk Encryption 1.2 you will find all you want to know about securing hard disk and partitions by means of Comodo Disk Encryption which is also capable of encrypting files and folders in smaller containers called Virtual Drives...
    By Mark Muller August 8, 2011 

  • Backup your Vista File Encryption Key before it’s too late

    You need to backup or export your EFS file encryption key in Windows Vista in order to recover your encrypted data should the original encryption key get lost or corrupted, or if you intend to move your encrypted data from one Vista computer to another...
    By Mark Muller August 8, 2011 
showing 11-20 of 95 < Previous   |   page: 1   2   3   4   5  ...   |   Next >
More To Explore