1. Technology

Articles related to encryption

Encryption - 40-bit vs 128-bit Encryption - What is the Difference?
Two common encryption techniques are '40-bit' and '128-bit.' Discover what these encryption techniques really mean to you.
http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm
Encryption 101 - Security - About.com
A hands-on approach to learning about encryption for those of us who aren't good at math.
http://netsecurity.about.com/od/encryptionandcryptography/a/Encryption-101-Understanding-Encryption.htm
Protect Your Data Using Encryption - Security - About.com
Articles and information about encryption and various forms of cryptography including coverage of public key infrastructure (PKI) and steganography.
http://netsecurity.about.com/od/encryptionandcryptography/
Secure Your Emails and Protect Your Privacy Through Encryption ...
Unless, of course, you have encrypted. With encryption, only the intended recipient will be able to open and read your message. As an additional bonus, they'll ...
http://email.about.com/od/secureemailbyencryption/
How to Encrypt Your Wireless Network - Security - About.com
... traffic safe from hackers and eavesdroppers? Learn why your current wireless encryption might not be adequate and what you can do to protect your network.
http://netsecurity.about.com/od/secureyourwifinetwork/a/How-To-Encrypt-Your-Wireless-Network.htm
How to Encrypt Your Files With TrueCrypt - Mobile Office - About.com
Easy step-by-step directions on how to protect your files and folders with the free, open-source encryption program TrueCrypt.
http://mobileoffice.about.com/od/mobilesecurity/ss/how-to-encrypt-files-with-TrueCrypt.htm
What is Encryption? - C/C++/C - About.com
Learn about encryption and how messages are disguised.
http://cplus.about.com/od/introductiontoprogramming/p/encryption.htm
Network Security Glossary: Encryption
A definition of the network security term encryption.
http://netsecurity.about.com/cs/generalsecurity/g/def_encryption.htm
Encrypting Access Databases - About.com
Security-conscious database users have long called for the ability to use strong encryption in Microsoft Access. With the release of Access 2007, Microsoft ...
http://databases.about.com/od/productinfo/a/encryption.htm
How to Encrypt Android and iPhone Cell Phone Data - Mobile Office
Protect the information on your smartphone from prying eyes and hackers with these simple steps.
http://mobileoffice.about.com/od/mobile-devices/a/How-To-Encrypt-The-Data-On-Your-Android-Phone-Or-Iphone.htm
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10      Next

©2014 About.com. All rights reserved.