Your are here:hacking technology > encryption decipher > Article list

Multi-application smart card k?able to different security levelsHits:24
Organizations around the world are facing gr??eren security risk to your business than ever before. At the same time, mean tighter regulation and stricter Kontrollma?assumed that these same organizations under increasing pressure...10/29/2010
Output switch includes the secure transmission of large?s files, the encrypted message K?body and daHits:10
Output Software Technologies'Switching Output 2.0 integrated functions for major companies, the M?opportunity to protect and classify confidential information by e-mail, CD / DVD, USB or uploaded is sent into the interior / Cloud server....10/28/2010
Internet users benefit from the speed of the e-mail encryption and digital certificates Comodo FreeHits:11
As a New York jeweler Harry Winston donated the famous Hope Diamond to the Smithsonian Institution, which sent the 45.52-carat gem on U.S. mail. E-mail users should be cautious, as Winston. Unlike rocks, scattering emails...10/27/2010
Kaspersky Personal Security PURE PC users and digital threats from pollution Cyber CrimeHits:23
Kaspersky Lab has released Kaspersky PURE, a comprehensive and innovative approach to security for all users of digital home PC from pollution and the threat of Internetkriminalit?t announced. PURE Kaspersky creates a fuss, no risk, in...10/26/2010
Korenix releases high-bandwidth wireless access point reliably?regularly network monitoring applicatHits:12
Korenix has released the 2450 IEEE 802.11b/g/n Wireless-N JetWave complaint Outdoor Wireless Access Point to provide speed, range and performance for the most demanding high-bandwidth network monitoring applications, supercharged engine....10/25/2010
The new version of the financial Zeus malware?sophisticated new mechanisms appropriate to commit onlHits:14
Zeus developers keep releasing new features - such as installation of high granularity?t injection browser - that one step ahead of the computer security community makes it stay?balanced and bug fixes and other issues in the past. This...10/23/2010
Check Point Positioned in the Leaders Quadrant in 2010 Magic Quadrant for Mobile Data Protection posHits:26
Check Point has set in the Leaders Quadrant in Gartner's recent Magic Quadrant for Mobile Data Protection 2010 was. According to Gartner Research, Mobile Data Protection (MDP) include planning systems and procedures to ensure...10/22/2010
University of Guelph protects all data on laptops and administrative staff with SecureDoc SaaSHits:13
The University of Guelph is a bigcomprehensive e Universit?ten in Canada, with over 20,000 students and 3,000 faculty and staff. WinMagic?Inc. has announced that the University of Guelph (UG) selected?hlt SecureDoc has managed IT...10/21/2010
The pros and cons of mobile employees and mobile officeHits:25
Currently, the mobile workforce to work wherever and whenever they want - that's it. In fact, many organizations also began issuing laptops instead of the standard desktop PC. But as always, any positive can not be negative, and this...10/19/2010
Group Security Solutions offers payment logical choice and cost savings of the PCI DSSHits:8
Group Logic has announced the launch of its new series of safe Zahlungsl?announced solutions. Designed to H?Merchant, H?dealers and Eink?shore with flexible payment platforms, given a choice of hardware or value?Additive options and offers...10/18/2010
University of Guelph W?WinMagic SecureDoc hlt profitable software-as-a-Service Full Disk EncryptionHits:26
To do, teachers and key staff to erm?matched, Heimatuniversit?t take for information on their laptops to the Gesamtproduktivit?t the University of Guelph (UG) to increased?Hen, a leading comprehensive university?ten in Canada, the search...10/16/2010
Mobile Controlware Cware module for video management software makes it?glitches, the monitoring of CHits:82
New mobile module Cware Controlware VMS unleashes the power of closed-circuit television from the borders of the control room and on mobile phones and PDAs. Security personnel, mobile patrols, emergency services, loss...10/15/2010
Explains how to bring the double off. Manual process shellHits:12
A, bypass.... Reference data: http://hi.baidu.com/csh0w/blog/item/ca8a8f83a9e462b46d811979.html Around the principle is intercepted. Get part of the program, its name is known to us, so the name and known registration code with can run...10/14/2010
How to reduce the cost of data security and stay safeHits:12
It has a testing time for economies worldwide, and w?While many L?Santander seem to recover, there are many voices warning of a relapse into recession. It is therefore surprising that CFOs with caution and follow the F?the principles...10/13/2010
USB memory forget to wash clothes in the local chemical cleaningHits:8
From 6 April, when data is lost and it is a bigs vulnerability can buy a company up to £ 500k costs with new powers of the Information Commissioner 's Office (ICO) for companies instead of not enough protection of customer...10/12/2010

Home  <<Prev  3   4   5   6   7   8   9   10   11   12   13  Next>>  Last

Current Page:8 , Total 33 Pages, Every Page 15 Records, Total Records: 491

Hot Articles
Recommend Articles
New Articles
Sub category