encryption

Thu
21
Jun
Dennis Faas's picture

'CTI Text Encryption 3.0', and 'Pixia 4.79d'

CTI Text Encryption 3.0 This is a text encryption and decryption software tool that you can use to encrypt highly sensitive computerized data using more than one 'key.' It's a small, highly portable, very efficient, and easy to use system that ... increases your ability to conveniently and securely keep critical information away from the eyes of others. http://ctiencrypt.codeplex.com Pixia 4.79d Pixia, originally engineered by famed Japanese designer Isao Maruoka, is a popular software tool that's great for creating full-color graphics on your computer. Custom digital art tools allow the user to ... (view more)

Wed
03
Nov
Dennis Faas's picture

New 'WiFi Direct' Makes Wireless Networking Simple

Five portable devices have become the first certified as 'WiFi Direct,' a new system designed to rival Bluetooth in making it easy to connect devices without wires. At the moment, most WiFi-enabled devices can only connect through a router. The ... alternative is to use a tool in Windows known as an ad-hoc network connection, but this is difficult to establish and often unstable. While that's fine for home and office environments, it's of little use to business users on the road. It's also tricky to use with devices such as phones and digital cameras. The main solution to that problem has been ... (view more)

Tue
21
Sep
Dennis Faas's picture

'Cddoc 0.42', and 'Cryptainer LE Encryption Software'

Cddoc 0.42 CDDoc is a program that performs benchmarks on your optical drivers, including your compact disc driver, digital versatile disc driver, and more. It logs useful information about these drives, which can be viewed directly or as a log file ... in your favorite text viewer. http://www.blackoutlamp.com Cryptainer LE Encryption Software Cryptainer LE, free disk encryption software, creates multiple 100 MB files of encrypted and password protected drives and containers. The Cryptainer drive can be loaded and unloaded. Not only can you encrypt files and folders but you can also install ... (view more)

Thu
22
Dec
Dennis Faas's picture

'Encryption Pack For Ms Office', and 'Expired Cookies Cleaner'

Encryption Pack for Ms Office MS Office offers a simple way to protect a document by using a password entry. This provides a basic security for MS Word, Excel documents (.DOC, .XLS, .PPT) from unauthorized access. But security specialists do not ... recommend to use build-in MS Office security features. For example: take a quick browse through Google and you'll be able to turn up as many MS Office password crackers as you like. Encryption Pack for MS Office, on the other hand, is a great way to protect your documents using strong encryption. http://www.rohos.com/encryption-pack/ Expired Cookies ... (view more)

Fri
25
Nov
Dennis Faas's picture

Password Saver Review

Synopsis: Password Saver is a powerful, feature-rich solution for storing all your password information in a secure, centralized database on your hard drive. It uses industrial strength 256-bit encryption to keep your passwords secure, while ... providing an easy-to-use interface for organizing, adding and editing your password records. Password Saver provides many pre-defined templates for commonly used records such as web site and email accounts, so you can get started adding data right away. Password Saver's advanced import/export features also let you share passwords with co-workers and ... (view more)

Wed
10
Aug
Dennis Faas's picture

Dictionary Attack

A dictionary attack refers to the general technique of trying to guess some secret by running through a list of likely possibilities, often a list of words from a dictionary. It contrasts to a brute force attack in which all possibilities are tried. ... The attack works because users often choose easy-to-guess passwords, even after being exhorted against doing so. Dictionary (and brute force) attacks may be applied in two main situations: in cryptanalysis, in trying to determine the key needed to decrypt a given piece of encrypted data; in computer security, in trying to gain unauthorized access ... (view more)

Tue
15
Mar
Dennis Faas's picture

Genie Backup Manager Review

The last three articles in our newsletter have provided an in-depth look into The Importance of Backing up Data , highlighted a number of Backup Strategies , and even presented a Six Point Guide to Buying Backup Software . At the same time the ... articles were being compiled, however, I quietly enlisted myself on a top secret mission to research, review, and rigorously test a never-ending list of backup software. The purpose: to find the best, easiest to use, feature-packed backup utility according to the stringent set of criteria previously established in our 6 Point Purchasing Guide (namely: ... (view more)

Wed
24
Sep
Dennis Faas's picture

AccountLogon Review

I visit dozens of web sites daily, and many of them require a username and password. I once used RoboForm to manage my passwords and form field data. Recently, I discovered a program called AccountLogon which organizes my password information and ... protects my data with 448-bit ["blowfish"] encryption -- an encryption level higher than RoboForm Pro (3DES). Side note: A higher encryption level means greater security. In short, it would take a very skilled hacker to "crack" an encrypted 3DES file, and much (much!) longer to crack a 448-bit blowfish encrypted file. What is ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)

Pages

Subscribe to RSS - encryption