Articles related to encryption
Encryption - 40-bit vs 128-bit Encryption - What is the Difference?
Two common encryption techniques are '40-bit' and '128-bit.' Discover what these encryption techniques really mean to you.
Encryption 101 - Security - About.com
A hands-on approach to learning about encryption for those of us who aren't good at math.
Protect Your Data Using Encryption - Security - About.com
Articles and information about encryption and various forms of cryptography including coverage of public key infrastructure (PKI) and steganography.
Secure Your Emails and Protect Your Privacy Through Encryption ...
Unless, of course, you have encrypted. With encryption, only the intended recipient will be able to open and read your message. As an additional bonus, they'll ...
What is Encryption? - C/C++/C - About.com
Encryption (and decryption) are the processes involved in the science of cryptography. Take a message in plain text and encrypt it so it cannot be understood ...
How to Encrypt Your Wireless Network - Security - About.com
... traffic safe from hackers and eavesdroppers? Learn why your current wireless encryption might not be adequate and what you can do to protect your network.
How to Encrypt Your Files With TrueCrypt - Mobile Office Technology
Easy step-by-step directions on how to protect your files and folders with the free, open-source encryption program TrueCrypt.
Encrypting Access Databases - About.com
Security-conscious database users have long called for the ability to use strong encryption in Microsoft Access. With the release of Access 2007, Microsoft ...
Encryption in PHP - PHP/MySQL - About.com
In PHP we can use the crypt () function to create one way encryption. This means that the data is encrypted but cannot easily be decrypted. Although at first ...
Network Security Glossary: Encryption
A definition of the network security term encryption.