<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>computing/smb-security/topics/encryption on Bright Hub</title>
    <link>https://www.brighthub.com/tags/computing/smb-security/topics/encryption/</link>
    <description>Recent content in computing/smb-security/topics/encryption on Bright Hub</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <atom:link href="https://www.brighthub.com/tags/computing/smb-security/topics/encryption/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>BitLocker To Go Tutorial: Using the Auto-Unlock Feature for USB Drive Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128810/</link>
      <pubDate>Sat, 15 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128810/</guid>
      <description>Windows 8 BitLocker To Go applies the same AES encryption to USB flash drives that is available through BitLocker Drive Encryption for local drives. This portable version helps protect your data in transit between other Windows computers so you don&amp;rsquo;t have to worry if you lose your drive.</description>
    </item>
    <item>
      <title>Changing BitLocker Encryption Strength from 128-Bit to 256-Bit: Tutorial</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128816/</link>
      <pubDate>Sat, 15 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128816/</guid>
      <description>If you are highly concerned about security, you might be pleased to discover that Microsoft gives you the option of enabling 256-bit AES encryption, which increases the number of possible key combinations from 2128 to 2256. Learn how to change encryption strength in BitLocker.</description>
    </item>
    <item>
      <title>Disabling BitLocker To Go: How to Turn Off BitLocker and Decrypt Files</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128824/</link>
      <pubDate>Sat, 15 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128824/</guid>
      <description>If you decide you no longer want or require encryption on your removable media, you can disable BitLocker To Go. Learn how to reverse encryption and return your data to its original state.</description>
    </item>
    <item>
      <title>When Should You Change Your BitLocker Password and How Do You Change It?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128777/</link>
      <pubDate>Wed, 12 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128777/</guid>
      <description>Although you probably won&amp;rsquo;t need to do so very often, knowing how to go about selecting a new password for your BitLocker account is imperative if you feel it may have been compromised. These straightforward steps will walk you through the process.</description>
    </item>
    <item>
      <title>Encrypt Your USB Drive Using BitLocker To Go</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128771/</link>
      <pubDate>Fri, 07 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128771/</guid>
      <description>You would never want your USB drive to be accessed by strangers. Here&amp;rsquo;s how to encrypt your flash drive using BitLocker To Go.</description>
    </item>
    <item>
      <title>How to Create Encrypted Container Files With TrueCrypt 7.1a</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128776/</link>
      <pubDate>Fri, 07 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128776/</guid>
      <description>TrueCrypt is safe to use, and should be considered by anyone looking for trustworthy open-source software.</description>
    </item>
    <item>
      <title>Learn How to Encrypt Any File for Free with 7-Zip</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/128789/</link>
      <pubDate>Fri, 07 Nov 2014 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/128789/</guid>
      <description>Find out how to encrypt any file for free with 7-Zip. Read this tutorial.</description>
    </item>
    <item>
      <title>Amazon&#39;s Silk Browser and Security: Trusting Amazon With Your Browsing</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/125985/</link>
      <pubDate>Mon, 24 Oct 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/125985/</guid>
      <description>Amazon&amp;rsquo;s Kindle Fire set the media alight with security and privacy concerns when it was announced. Much of the initial attention was focused on whether the Silk browser was performing a man-in-the-middle attack on its users. Amazon responded, but aspects of Silk&amp;rsquo;s architecture are still concerning.</description>
    </item>
    <item>
      <title>Learn How to Secure Your Data with this Encryption Guide</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/125242/</link>
      <pubDate>Fri, 30 Sep 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/125242/</guid>
      <description>Encryption is a key process in network security, and very often indispensable when transmitting sensitive data. A good knowledge of encryption practices is part of keeping a home network safe.</description>
    </item>
    <item>
      <title>Using Trend Micro Encryption Email for Windows, Windows Server, or Citrix Server</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/124331/</link>
      <pubDate>Wed, 07 Sep 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/124331/</guid>
      <description>Exchanging safe, secure e-mail messages is easy with the help of the right e-mail program.  No special knowledge or training is needed to use this popular software, but will it help keep your messages private?</description>
    </item>
    <item>
      <title>Ten Things Every Computer User Should Know about Security Encryption for Online Data</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/122298/</link>
      <pubDate>Sat, 30 Jul 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/122298/</guid>
      <description>Internet data is vulnerable to interception when in transit over networks, and without encryption, anyone can intercept and read the data. The increasing level of cyber attacks makes security encryption for online data an absolute must, and all computer users require knowledge of encryption basics.</description>
    </item>
    <item>
      <title>Using PGP Encryption on an FTP site</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/117568/</link>
      <pubDate>Thu, 19 May 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/117568/</guid>
      <description>Ever had to provide a copy of a confidential file to another organization?  Have you ever used some encryption program like PGP (Pretty Good Privacy) and then emailed the file? What if the file was larger than is allowed for email and what if the only option you have is FTP?  What to do you do then?</description>
    </item>
    <item>
      <title>A Quick Guide about the Folder Lock Software (Windows 7)</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/116648/</link>
      <pubDate>Sat, 07 May 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/116648/</guid>
      <description>Ever wished that you could discreetly hide some sensitive files or folders residing in your computer? Ever wanted to have the equivalent of a safe in your hard disk? Now you can do both of these by employing this particular program.</description>
    </item>
    <item>
      <title>Introducing and Presenting Three of the Best Email Encryption Software</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/113852/</link>
      <pubDate>Thu, 14 Apr 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/113852/</guid>
      <description>Ever wished that your emails were a bit more secure? Have you been afraid that someone might intercept your correspondence? Read this article and put an end to this fear by learning about the best programs for email encryption.</description>
    </item>
    <item>
      <title>Pros and Cons of Internet Traffic Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/113685/</link>
      <pubDate>Tue, 12 Apr 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/113685/</guid>
      <description>You may have heard about the possibility of using encryption on the data you handle over the internet. But is it really worthwhile? Do the advantages involved outweigh the disadvantages? Read this article to find out.</description>
    </item>
    <item>
      <title>Data Encryption Key (DEK) Tips</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/111353/</link>
      <pubDate>Wed, 23 Mar 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/111353/</guid>
      <description>Have you every experienced a violation of your computer security? Have you thought that the keys you apply may not be as good as they appear to be? Read this article to find out how you can avoid any computer security violations by strengthening your keys, in a hustle-free and simple way.</description>
    </item>
    <item>
      <title>Encryption Tools for Securing Public Hotspot Connections</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/109710/</link>
      <pubDate>Thu, 10 Mar 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/109710/</guid>
      <description>Wi-fi hotspots are a favorite of malicious hackers. Unencrypted data floats around without rhyme or reason, easy fruit for identity thieves and attackers. Find out about some free tools you can use for encrypting your traffic and securing your connection while on public wi-fi hotspots.</description>
    </item>
    <item>
      <title>Page 1, Working with Removable Media: Overview, and Differences Between Various Removable Media</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/106640/</link>
      <pubDate>Tue, 15 Feb 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/106640/</guid>
      <description>Ever lost or misplaced a flash/thumb drive or a mini external USB hard drive?  What was the first thing that came to your mind?  Did you panic?  Did you wish that no one would find it?  And did you wish you had it backed up?  If you answered yes to any of these questions, then read on.</description>
    </item>
    <item>
      <title>Using Encryption for Bluetooth Data Transfers</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/106638/</link>
      <pubDate>Tue, 15 Feb 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/106638/</guid>
      <description>How to prevent strangers accessing or viewing your data when using a Bluetooth-enabled device? The answer is simple and that is to take advantage of authentication and encryption in Bluetooth software.</description>
    </item>
    <item>
      <title>How to Encrypt Print Jobs</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/104117/</link>
      <pubDate>Sun, 23 Jan 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/104117/</guid>
      <description>Using PrinterShare you can send an encrypted document directly across the internet to your recipient&amp;rsquo;s printer!</description>
    </item>
    <item>
      <title>Encryption External Hard Drives: A Guide to Protecting External Hard Drive Data</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/103044/</link>
      <pubDate>Sat, 15 Jan 2011 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/103044/</guid>
      <description>External hard drives are great because they&amp;rsquo;re portable. You can take your files from your home to your office (and vice versa) easily. However, this can be a security issue if the hard drive has important files on it. Encrypting an external drive will help protect this data.</description>
    </item>
    <item>
      <title>How to Install Bitlocker on Windows 7</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/101088/</link>
      <pubDate>Wed, 29 Dec 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/101088/</guid>
      <description>With Windows 7, Microsoft&amp;rsquo;s Bitlocker encryption tool has been revised and is now easier to use.</description>
    </item>
    <item>
      <title>A Guide to Disk Image Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/100805/</link>
      <pubDate>Mon, 27 Dec 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/100805/</guid>
      <description>You can safely store information without risk of theft or intrusion on Mac OS X with disk image encryption.</description>
    </item>
    <item>
      <title>Guide to Dell File Encryption Software</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/100804/</link>
      <pubDate>Mon, 27 Dec 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/100804/</guid>
      <description>With data protection ever more important, Dell is one of several major computer manufacturers are taking steps to provide the end user with encryption tools.</description>
    </item>
    <item>
      <title>How to Delete History of Encrypted Webpages - Erase Encrypted Pages from Browser History in Internet Explorer</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/89191/</link>
      <pubDate>Wed, 29 Sep 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/89191/</guid>
      <description>Deleting encrypted webpages such as your online banking records can be simple if you know how to access Internet Options and you understand which options best suit your surfing habits. Internet Options allow the user to set how often, if at all, the user would like to store web history.</description>
    </item>
    <item>
      <title>Addonics® Dual CipherChain Encrypt Your Data</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/84901/</link>
      <pubDate>Mon, 30 Aug 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/84901/</guid>
      <description>Providing a secure place to sensitive information is easy - just install some software and all the user of the storage device needs to do is remember the password.  What If you could use a key, stick it in, and presto access to the data? This article is a review of the Addonics Dual CipherChain.</description>
    </item>
    <item>
      <title>Encrypt Wireless Network Connection</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/83703/</link>
      <pubDate>Mon, 23 Aug 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/83703/</guid>
      <description>Today, wireless devices have become so economical that anyone can setup a wireless network within minutes. Increased use of wireless networks also means that you can be a victim of an intruder lurking around your network. This article covers some of the ways to encrypt wireless internet connection.</description>
    </item>
    <item>
      <title>How to use Strong Encryption for Data</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/82179/</link>
      <pubDate>Fri, 13 Aug 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/82179/</guid>
      <description>For decades now, computer users have relied on encryption to ensure the safety of data. If you use strong encryption for data, the easier it will be to keep your private and confidential data secure.</description>
    </item>
    <item>
      <title>SSL Certificate Encryption Tips</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/80653/</link>
      <pubDate>Sat, 31 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/80653/</guid>
      <description>SSL stands for Secure Socket Layer. SSL is a security protocol that provides a secure means to deliver the data between two machines over the internet. In the present world of technology, it has become highly essential to ensure that your data is safe over the internet. SSL Encryption does the work.</description>
    </item>
    <item>
      <title>Examples of Cryptography used in Business and Government Applications</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/80137/</link>
      <pubDate>Thu, 29 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/80137/</guid>
      <description>Cryptography is the study and practice of hiding information. There are a few examples of cryptography that are used in business and government to help prevent unwanted disclosure of messages and other types of information. Find out information on the most popular types and how they are used.</description>
    </item>
    <item>
      <title>Comparing Digital Signatures vs Encryption Email</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/78931/</link>
      <pubDate>Fri, 23 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/78931/</guid>
      <description>Asymmetric encryptions is implemented in both digital signatures and email encryption, however the similarity between the two ends there. This article looks at each process in detail, and then explores the differences between them.</description>
    </item>
    <item>
      <title>Top 5 Options for Automated File Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/78501/</link>
      <pubDate>Tue, 20 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/78501/</guid>
      <description>Automated file encryption makes it easy to keep your files secure. Automated file encryption requires no effort on your side and this is its best advantage. There are a couple of approaches to automated file encryption, and they are explained briefly in this article.</description>
    </item>
    <item>
      <title>Advantages and Disadvantages of WEP WPA Network Security</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/78216/</link>
      <pubDate>Mon, 19 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/78216/</guid>
      <description>When setting up a wireless network for your home or business, configuring wireless security is a feature often overlooked.   Unfortunately this allows malicious users to gain access to your network and possibly obtain confidential information. WEP and WPA are two options available for security.</description>
    </item>
    <item>
      <title>How to Encrypt Your Internet Traffic - Encryption Software Is a Must</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/78227/</link>
      <pubDate>Mon, 19 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/78227/</guid>
      <description>The Internet is a very insecure medium and this is why, if you want peace of mind, you need to take measures to protect yourself. Encryption is one of the best defenses you can take and this is why you need to learn how to encrypt your Internet traffic.</description>
    </item>
    <item>
      <title>Wireless Encryption Protocol - All You want to Know</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/78215/</link>
      <pubDate>Mon, 19 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/78215/</guid>
      <description>Wireless Encryption Protocol or the Wired Equivalent Privacy is used to protect IEEE 802.11 wireless networks. This article offers an overview of the protocol and explains how to add it to your wireless network.</description>
    </item>
    <item>
      <title>File Encryption Online – Reviewing your Favorites</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/77638/</link>
      <pubDate>Wed, 14 Jul 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/77638/</guid>
      <description>For online data, be it a cloud backup, email, or IMs, the probability of interception and misuse is always there. This article talks about the need for file encryption online and then reviews some of the services and software that offer safety to your online data.</description>
    </item>
    <item>
      <title>Methods for Encrypting Word Documents Using | Windows 7 | Microsoft Office | TrueCrypt</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/76161/</link>
      <pubDate>Wed, 30 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/76161/</guid>
      <description>Encrypting your office documents will render them useless if they get into the wrong hands. Here are several methods for encrypting Word documents.</description>
    </item>
    <item>
      <title>Is there a Difference Between Cryptography or Encryption terms? Includes Definitions, Types and Applications used for Secure Transmission of Data and Messages</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/75817/</link>
      <pubDate>Tue, 29 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/75817/</guid>
      <description>When you think about cryptography or encryption, you may wonder if they are the same thing. Find out the difference between these two terms and how they are used in relation to the secure transmission of messages and other information.</description>
    </item>
    <item>
      <title>What Does Bulk Encryption Mean?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/75850/</link>
      <pubDate>Tue, 29 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/75850/</guid>
      <description>Bulk encryption protocols provide safe and cost effective methods for protecting data transmissions from compromise and theft. This article explores the encryption process, the different available algorithms, and the bulk encryption process.</description>
    </item>
    <item>
      <title>Jump Drive Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/75669/</link>
      <pubDate>Mon, 28 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/75669/</guid>
      <description>One major advantage of using a jump drive is the ability to carry gigabytes worth of data at your fingertips. Most of this information are likely personal or confidential in nature. Imagine losing those data to the wrong hands. Don&amp;rsquo;t like to worry? Why not use jump drive encryption?</description>
    </item>
    <item>
      <title>Computer Encryption Basics - Purpose and Pros &amp; Cons</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/75217/</link>
      <pubDate>Thu, 24 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/75217/</guid>
      <description>Computer Encryption is a process of encrypting or converting the unsecured data such as text, video, image, etc. into a form that can only be understood by its intended recipient. The data is called the cipher text and the process is referred to as encryption or data encryption.</description>
    </item>
    <item>
      <title>Comparison between DES, 3DES, AES and Blowfish (Data Encryption Algorithms)</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/75099/</link>
      <pubDate>Wed, 23 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/75099/</guid>
      <description>The need for data encryption arose by the growing concern fo the safety and security of the data. In this article, various data encryption algorithms under comparison are DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard) and Blowfish (Best performance).</description>
    </item>
    <item>
      <title>What is the International Data Encryption Algorithm IDEA? How it Works and What Industries are Using it as a Security Measure.</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/74996/</link>
      <pubDate>Tue, 22 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/74996/</guid>
      <description>What is the International Data Encryption Algorithm IDEA? In this brief overview, find out about how it works and is being used as a security measure for business and government.</description>
    </item>
    <item>
      <title>The Main Benefit of Data Encryption - Learn Why Data Encryption is Important for Your Laptop</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/74780/</link>
      <pubDate>Sun, 20 Jun 2010 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/74780/</guid>
      <description>Data encryption is not used by many, and some would consider it cumbersome and annoying to use.  So why use data encryption?  What is the purpose of it?  Read on to understand why data encryption is important and why only taking preventative measure to protect your computer are not enough&amp;hellip;</description>
    </item>
    <item>
      <title>What is a Brute Force Attack?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/59930/</link>
      <pubDate>Tue, 22 Dec 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/59930/</guid>
      <description>Not just a severe lynching anymore&amp;hellip;</description>
    </item>
    <item>
      <title>Passware Kit Forensic to crack Microsoft Bitlocker?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/58976/</link>
      <pubDate>Fri, 11 Dec 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/58976/</guid>
      <description>BitLocker hacked, BitLocker is now cracked software, you are free to read protected data! That&amp;rsquo;s what one could have read recently in many places after Passware Kit Forensic release, which introduced a new feature. What&amp;rsquo;s all the fuss about?</description>
    </item>
    <item>
      <title>File &amp; Folder Protector Review</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/58868/</link>
      <pubDate>Thu, 10 Dec 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/58868/</guid>
      <description>File &amp;amp; Folder Protector (FPP) is a small, easy-to-use application which password protects files and folders on a Windows based computer. Here’s all you want to know about it.</description>
    </item>
    <item>
      <title>What You Should Do if Windows XP WPA Stops Working</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/58038/</link>
      <pubDate>Mon, 30 Nov 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/58038/</guid>
      <description>If it is determined that the WPA encryption has stopped working, this article will outline various ways to fix the problem and have your wireless connection resume working.</description>
    </item>
    <item>
      <title>A full-depth Review of Comodo SecureEmail</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/54260/</link>
      <pubDate>Fri, 30 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/54260/</guid>
      <description>Comodo SecureEmail is an innovative software making top email encryption easier, and thus safer. In this article you find all what you want to know about the top-notch Comodo SecureEmail 2.0 including valuable tips.</description>
    </item>
    <item>
      <title>Comodo Disk Encryption Review</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/53760/</link>
      <pubDate>Tue, 27 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/53760/</guid>
      <description>Here in our review of Comodo Disk Encryption 1.2 you will find all you want to know about securing hard disk and partitions by means of Comodo Disk Encryption which is also capable of encrypting files and folders in smaller containers called Virtual Drives, and offers two-factor authentication.</description>
    </item>
    <item>
      <title>Blowfish Encryption and Twofish Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/53270/</link>
      <pubDate>Fri, 23 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/53270/</guid>
      <description>Here’s all you want to know about Bruce Schneier’s Blowfish encryption as well as all about Twofish, an AES finalist, and successor of Blowfish. Both, Blowfish and Twofish, are absolutely free symmetric encryption algorithm operating a variety of key lengths on block ciphers.</description>
    </item>
    <item>
      <title>Conventional Methods of Encryption - Character-Level Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/53265/</link>
      <pubDate>Fri, 23 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/53265/</guid>
      <description>Are you looking for ways to secure your information? Are you concerned about security of your important data? If yes, then you are not the first one! Data tampering is not a new issue, nor is it unique to the computer era. Find out how you can encrypt &amp;amp; secure your data from hackers. Read more&amp;hellip;</description>
    </item>
    <item>
      <title>Find out here if AES Encryption has been Cracked</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/53268/</link>
      <pubDate>Fri, 23 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/53268/</guid>
      <description>Apart from social engineering exist two ways to break an encryption key like AES, brute force and cryptanalysis. Find  out here whether AES encryption can be cracked any time soon, along with the latest AES development and recommendations from IT security evangelist Bruce Schneier.</description>
    </item>
    <item>
      <title>Types of Encryption: Symmetric Encryption and Asymmetric Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/53266/</link>
      <pubDate>Fri, 23 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/53266/</guid>
      <description>Here all you want to know symmetric encryption and asymmetric encryption, the fundamental  types of encryption schemes. This article also features stream ciphers, blocks ciphers and, for instance, sheds a light on Public Key Cryptography.</description>
    </item>
    <item>
      <title>What is Advanced Encryption Standard AES</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/53267/</link>
      <pubDate>Fri, 23 Oct 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/53267/</guid>
      <description>Here’s all you want to know about AES Encryption, the Advanced Encryption Standard which implements symmetric cryptography by means Rijndael algorithm in key lengths of 128, 192 and 256 bits.</description>
    </item>
    <item>
      <title>An Essential Application for USB Security: USB Secure Review</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/48876/</link>
      <pubDate>Mon, 14 Sep 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/48876/</guid>
      <description>With the increasing capacity of the USB sticks, we are carrying more of our files with them. What if they get lost or stolen? With our most important files? Certainly we need to have them encrypted and here is where USB Secure comes to play.</description>
    </item>
    <item>
      <title>Open-source Vanish expires encrypted data</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/45134/</link>
      <pubDate>Sun, 09 Aug 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/45134/</guid>
      <description>Vanish is a prototype of a new approach to meeting the privacy challenges of sending messages or other information into Web space; you can&amp;rsquo;t delete all copies which immediately begin circulating.  Open-source Vanish makes this possible.  It also enables expiration of local documents.</description>
    </item>
    <item>
      <title>Kryptel File and Folder Encryption for Windows</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/44995/</link>
      <pubDate>Fri, 07 Aug 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/44995/</guid>
      <description>Kryptel 5.8 provides easy file and folder encryption as well as encrypted backups for Windows without administrative overhead. Find here all what you want to know about INV Softwork’s Kryptel file and folder encryption.</description>
    </item>
    <item>
      <title>Review of Silver Key Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/44996/</link>
      <pubDate>Fri, 07 Aug 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/44996/</guid>
      <description>Here you find all you want to know about Silver Key, a Windows program designed to encrypt files and folders so that they can be sent securely over the Internet. The software additionally gives you the option of creating self-extracting archives and has a number of features known from installers.</description>
    </item>
    <item>
      <title>BestCrypt for Windows</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/44908/</link>
      <pubDate>Thu, 06 Aug 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/44908/</guid>
      <description>Here’s all what you want to know about Jetico BestCrypt for Windows file and folder encryption including BCArchive encrypted archives.  This article additionally contains useful information about the BestCrypt add-on BestCrypt Volume encryption, the BestCrypt Traveler freeware, and much more.</description>
    </item>
    <item>
      <title>BCWipe | Military-Grade Wipe &amp; File Eradication</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/44746/</link>
      <pubDate>Tue, 04 Aug 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/44746/</guid>
      <description>BCWipe permits you to securely delete files and folders of your computer without unnecessary options. Here’s all you want to know about BCWipe military-grade wipe and file eradication.</description>
    </item>
    <item>
      <title>Can You Stop Hackers From Getting Into Your Webmail?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/43607/</link>
      <pubDate>Tue, 28 Jul 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/43607/</guid>
      <description>So you&amp;rsquo;re using Webmail, but you are worried about hackers getting access to it. If it is available anywhere in the world, it&amp;rsquo;s available to hackers everywhere in the world. So how do you stop hackers from hacking into your Webmail? This article provides help to prevent Webmail hacking.</description>
    </item>
    <item>
      <title>Free Secure Email Services: The Top 3</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/43612/</link>
      <pubDate>Tue, 28 Jul 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/43612/</guid>
      <description>If you need secure, private, verifiable email, encrypted end-to-end, and want it for free, is that possible? Free secure email is available, and there are several ways to get it. Since traditional email service with email clients or webmail is not secure by default, these are valuable services.</description>
    </item>
    <item>
      <title>How to Recover Deleted Data</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/43608/</link>
      <pubDate>Tue, 28 Jul 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/43608/</guid>
      <description>How to recover a deleted file? Sometimes, knowingly or unaware, we delete some important files. Suddenly we realize our mistake and need the file back. This article helps you retrieve data in such cases.</description>
    </item>
    <item>
      <title>Review of KeePass Professional Edition Password Safe</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/42804/</link>
      <pubDate>Tue, 21 Jul 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/42804/</guid>
      <description>Having a lot of passwords to remember? Nobody, but KeePass can remember all those highly secure passwords. Here’s what you need to know about free KeePass Password Safe 2.08, also known as KeePass Professional, including a useful tip for remembering bulk account passwords as a best practice.</description>
    </item>
    <item>
      <title>Folder Lock Review: Password Protection &amp; File Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/41809/</link>
      <pubDate>Fri, 10 Jul 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/41809/</guid>
      <description>Folder Lock fills a gap in Windows operating systems: Password protecting objects such as files, folders and drives for example. On top of that is Folder Lock a viable alternative to Windows built-in EFS File encryption. Here’s all you want to know about Folder Lock encryption and locking.</description>
    </item>
    <item>
      <title>Best Ways to Secure Your Emails</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/40632/</link>
      <pubDate>Mon, 29 Jun 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/40632/</guid>
      <description>At your business or in your home, we take a look at the three best ways to have a secure email experience without compromises. Read on inside.</description>
    </item>
    <item>
      <title>What is a Proxy Server and How to use Proxies</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/40611/</link>
      <pubDate>Mon, 29 Jun 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/40611/</guid>
      <description>Proxies not only serve the purpose of circumventing firewalls and similar devices for accessing blocked sites in school and at the workplace, they are also useful for browsing the web without leaving traces, and for faster load times of Intranet sites.</description>
    </item>
    <item>
      <title>Best Free Password Managers and the Top Free Password Manager</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/39203/</link>
      <pubDate>Thu, 18 Jun 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/39203/</guid>
      <description>Among the top free password managers Keepass Password Safe is by far the best free password manager. Here you find all you want to know about Keepass Password Safe as well as alternative password management software including Comodo i-Vault, MyPadlock, Access Manager, PassLocker and Password Dragon.</description>
    </item>
    <item>
      <title>The Best Free Email Encryption Software</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/38933/</link>
      <pubDate>Tue, 16 Jun 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/38933/</guid>
      <description>Prevent unauthorized users now from intercepting and viewing the emails you want to exchange with others by reading about some of the available freeware (listed here in the article) to help safeguard your emails.</description>
    </item>
    <item>
      <title>Encryption Simplified: What Is It?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/37870/</link>
      <pubDate>Fri, 05 Jun 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/37870/</guid>
      <description>Protecting valuable information has been a problem since the dawn of civilization. Romans used codes called ciphers to protect information they sent by courier. This is called encryption, and we use it with digital information every day. So what is encryption and how does it work?</description>
    </item>
    <item>
      <title>Mac Security: Removing iBotnet</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/36604/</link>
      <pubDate>Wed, 27 May 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/36604/</guid>
      <description>Been infected with iBotnet? Look inside for the best way to remove the infected files manually, with step-by-step instructions.</description>
    </item>
    <item>
      <title>The Best Free Hash and Checksum Calculators</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/36408/</link>
      <pubDate>Tue, 26 May 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/36408/</guid>
      <description>Top Free Hash and Checksum Calculators: Here you find the best hash and checksum calculators which, besides no cost, all have a competitive advantage. Febooti FileTweak Hash &amp;amp; CRC, FlyingBit Hash Calculator as well as Easy Hash are all freeware and support up to 130 hash and checksum algorithms!</description>
    </item>
    <item>
      <title>How To Use Bitlocker To Go</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/35534/</link>
      <pubDate>Sun, 17 May 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/35534/</guid>
      <description>BitLocker To Go complements BitLocker Drive Encryption so that Windows 7 can now protect both fixed as well as removable drives including USB sticks which often get misplaced or lost. Here’s how to set up BitLocker To Go, including tips for the encryption process and your USB stick protection.</description>
    </item>
    <item>
      <title>Sniffing Data with Ettercap for Linux and Windows</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/35545/</link>
      <pubDate>Sat, 16 May 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/35545/</guid>
      <description>Ettercap NG is a suite of tools that performs a man in the middle attack on a local area network (LAN).  It should be used for testing your network&amp;rsquo;s security.</description>
    </item>
    <item>
      <title>www.HashSum.com - Top online Hash and Checksum Calculator Reviewed</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/35179/</link>
      <pubDate>Fri, 15 May 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/35179/</guid>
      <description>&lt;a href=&#34;https://www.HashSum.com&#34;&gt;www.HashSum.com&lt;/a&gt; is the best online hash value and checksum calculator supporting popular algorithms such as MD5, secure SHA-1 hash and CRC-32. Read on to find out more about &lt;a href=&#34;https://www.hashsum.com&#34;&gt;www.hashsum.com&lt;/a&gt;.</description>
    </item>
    <item>
      <title>TrueCrypt - One Of the Best File System Encryption Tools For Windows Vista</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/33712/</link>
      <pubDate>Wed, 29 Apr 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/33712/</guid>
      <description>Windows Vista is a secure operating system, and it offers many security features allowing users to protect their data. But, at the same time, it has some security holes as well. This is where TrueCrypt comes in handy. Find out how TrueCrypt can help you secure your data on Vista even more.</description>
    </item>
    <item>
      <title>How to Use the BitLocker Recovery Password Viewer</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/32511/</link>
      <pubDate>Wed, 22 Apr 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/32511/</guid>
      <description>BitLocker Drive Encryption protects an entire machine from unauthorized access. However, the data is lost to the user if they lose the key that decrypts the drive. Help is at hand with BitLocker Recovery Password Viewer.</description>
    </item>
    <item>
      <title>Using Encrypting File System in Windows Vista - Encrypting Files</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/31374/</link>
      <pubDate>Sat, 04 Apr 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/31374/</guid>
      <description>Ever lost a laptop? Was there any sensitive data on the hard drive? If so, you probably wish you had protected that data before it was lost or stolen. Using Windows Vista Encrypting File System (EFS), you can easily protect your data in case your machine is compromised or stolen.</description>
    </item>
    <item>
      <title>How To Backup Your File Encryption Key in Windows Vista</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/31197/</link>
      <pubDate>Thu, 02 Apr 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/31197/</guid>
      <description>You need to backup or export your EFS file encryption key in Windows Vista in order to recover your encrypted data should the original encryption key get lost or corrupted, or if you intend to move your encrypted data from one Vista computer to another. This article explains how.</description>
    </item>
    <item>
      <title>SQL Server 2005 and SQL Server 2008 Encryption</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/30664/</link>
      <pubDate>Sun, 29 Mar 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/30664/</guid>
      <description>Are your SQL applications truly secure?  In this article, the advancements in SQL&amp;rsquo;s ability to encrypt data is discussed.  Now native to SQL Server 2005 and 2008, SQL provides an additional step in protecting your data and sensitive information.</description>
    </item>
    <item>
      <title>How to Protect Your Files &amp; Folders with a Password - Including Tips for Windows XP &amp; Vista</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/29271/</link>
      <pubDate>Mon, 16 Mar 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/29271/</guid>
      <description>With Windows XP, protecting your zipped files and folders with a password is simple. Doing so with Windows Vista requires a little more work and the use of additional software. Learn how to do both in this Computer Security article, along with some helpful tips and advice.</description>
    </item>
    <item>
      <title>Use Free Email Certificates to Protect Your Email</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/28475/</link>
      <pubDate>Thu, 05 Mar 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/28475/</guid>
      <description>Want to ensure your email is secure?  Most modern email clients and many instant messenger programs have the capability to guarantee communication is private. With the ability to add digital signatures which keeps the email or conversation private these programs have built in tools to do just that.</description>
    </item>
    <item>
      <title>How To Create Unbreakable Passwords - A Strong Password Guide</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/28267/</link>
      <pubDate>Tue, 03 Mar 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/28267/</guid>
      <description>Ever had your password guessed then misused by someone? You need to create a strong password that no one can figure out with any number of tries. Follow these tips to create strong and secure passwords.</description>
    </item>
    <item>
      <title>What is E-commerce Security?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/28128/</link>
      <pubDate>Mon, 02 Mar 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/28128/</guid>
      <description>E-Commerce is buying and selling of goods and/or services, or indulging in any other commercial transaction over the Internet. With more and more people becoming computer-savvy, and the internet growing both in-depth and range, e-commerce is fast becoming the default way of doing business.</description>
    </item>
    <item>
      <title>Secure CD/DVD Data - Copytrax Compact Disc system</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/26689/</link>
      <pubDate>Sun, 22 Feb 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/26689/</guid>
      <description>Now, you can encrypt any CD/DVD using AES 256 bit encryption technology &amp;amp; protect your secure data. The innovative security device in Compact Disc format using powerful technology of encryption launched by Copytrax is expected to meet the security concerns of all sensitive data. Read more&amp;hellip;</description>
    </item>
    <item>
      <title>What is Encryption and When Should You Use it to Protect Data and Computers</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/22969/</link>
      <pubDate>Tue, 20 Jan 2009 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/22969/</guid>
      <description>Encryption is a big topic, much bigger than can be fit into a section of a small, business manual.  This article provides enough information about the how, what, and why of encryption that an owner or manager of a SMB knows when it’s reasonable and appropriate to encrypt information.</description>
    </item>
    <item>
      <title>Encrypt Your Files With File Castle.  Encrypting As Easy as 1,2,3.</title>
      <link>https://www.brighthub.com/computing/smb-security/reviews/15446/</link>
      <pubDate>Mon, 17 Nov 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/reviews/15446/</guid>
      <description>It&amp;rsquo;s getting more and more important to protect sensitive files on mobile drives, USB flash drives and     external hard drives.  You hear  the news stories of social security number&amp;rsquo;s  stolen after a person  finds a computer that was trashed.  With Folder Castle this is history.</description>
    </item>
    <item>
      <title>Virtual Private Networks in Business Environments</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/12789/</link>
      <pubDate>Sun, 26 Oct 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/12789/</guid>
      <description>Need to ensure your data is transmitted securely?  Virtual Private Networks ensure your business transmits data securely.  In this series, we examine how to setup VPNs on Microsoft Windows Vista, Windows XP Professional, Macintosh and Linux.  Learn how to set these VPNs up with step by step</description>
    </item>
    <item>
      <title>What Is SSL And Why SSL is Important on your Corporate Website</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/11080/</link>
      <pubDate>Thu, 02 Oct 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/11080/</guid>
      <description>Small business often underestimate the importance of a website. When they do get a website, it&amp;rsquo;s often created by a friend or inexperienced developer - and that can have disastrous consequences.</description>
    </item>
    <item>
      <title>Encryption Isn’t Really so Cryptic Part I</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/8131/</link>
      <pubDate>Mon, 22 Sep 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/8131/</guid>
      <description>The root of encryption goes back centuries, long before anyone even considered the notion of a “thinking machine.”</description>
    </item>
    <item>
      <title>How Not To Lose Data With BitLocker</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/1453/</link>
      <pubDate>Thu, 29 May 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/1453/</guid>
      <description>While BitLocker is a great way of preventing unauthorized people from accessing your data, it can also prevent your users from accessing it. Should a user lose his or her recovery password, any data that you encrypted with BitLocker will become permanently inaccessible. This article explains some steps you can take to stop that happening.</description>
    </item>
    <item>
      <title>How to Use BitLocker</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/1452/</link>
      <pubDate>Thu, 29 May 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/1452/</guid>
      <description>BitLocker is a security feature included in Windows Vista that can prevent your data from falling into the wrong hands by encrypting it, even if your computer is lost or stolen.</description>
    </item>
    <item>
      <title>Encryption Planning - What Data Should You Encrypt?</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/1290/</link>
      <pubDate>Thu, 15 May 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/1290/</guid>
      <description>Should you be encrypting your data? What data should you be encrypting? How should you be encrypting it? This article will highlight some points which you should consider when planning your encryption strategy.</description>
    </item>
    <item>
      <title>Using Microsoft BitLocker Drive Encryption Without A TPM Chip</title>
      <link>https://www.brighthub.com/computing/smb-security/articles/1292/</link>
      <pubDate>Thu, 15 May 2008 00:00:00 +0000</pubDate>
      <guid>https://www.brighthub.com/computing/smb-security/articles/1292/</guid>
      <description>This article explains how to enable BitLocker on a computer without a Trusted Platform Module (TPM) chip.</description>
    </item>
  </channel>
</rss>
