Jump to content

Search the Community

Showing results for tags 'Encryption'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 13 results

  1. Symantec PGP Command Line 10.3.0 MultiOS (Eng) + Patch Symantec PGP Command Line - the ability to automate encryption and signing of various business information, while ensuring that its local storage or transfer over the Internet. The product provides a new set of tools to encrypt large amounts of information. The product allows users to insert PGP encryption and digital signature functionality in the existing texts, ensuring the transmission or storage of information with power PGP cipher. PGP Command Line is designed for financial groups, health organizations, and other businesses that reg
  2. N.S.A. Foils Much Internet Encryption (The New York Times)The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. Associated PressThis undated photo released by the United States government shows the National Security Agency campus in Fort Meade, Md. The agency has circumvented or cracked much of the encryption, or digital scrambling, that
  3. GiliSoft Full Disk Encryption 3.3.0 GiliSoft Full Disk Encryption's offers encryption of all disk partitions, including the system partition.Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files. It provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identit
  4. Author: Whitson Gordon Posted Today 7:00 AM Keep on hearing about encryption but still not sure what it involves? Heres a basic introductionto encryption, when you should use it, and how to set it up. What Is Encryption? Encryption is a method of protecting data from people you dont want to see it. For example, when you use your credit card on Amazon, your computer encrypts that information so that others cant steal your personal data as it is being transferred. Similarly, if you have a file on your computer you want to keep secret only for yourself, you can encrypt it so that no one ca
  5. The respected encryption and network security company RSA Security (now a division of EMC), whose respect was already on stack after revelation by former NSA contractor Edward Snowden revealed that the NSA created a flawed random number generation system (Dual_EC_DRBG), Dual Elliptic Curve, which the most trusted security provider company RSA used in its Bsafe security tool. Until then RSA wasn't able to come up from this aspersion, a new document by Snowden revealed that RSA received $10 million from NSA for keeping Encryption Weak. Researchers from Johns Hopkins, the University of Wisconsin
  6. Microsoft confirmed today it will support HTTPS Strict Transport Protocol (HSTS) in Internet Explorer 12, bringing its browser in line with other major vendors in its support of the protocol. Browsers supporting HSTS force any sessions sent over HTTP to be sent instead over HTTPS, encrypting communication to and from a website. According to OWASP, HSTS protects users from a number of threats, in particular man-in-the-middle attacks by not only forcing encrypted sessions, but also stopping attackers who use invalid digital certificates. The protocol denies users the ability to override invalid
  7. Advanced Encryption Package 2014 Professional 5.96 Encryption Software - File encryption, Secure File Transfer, Batch File Encryption and Encrypted Backups - Advanced Encryption Package 2014 Professional - award-winning easy-to-use file encryption software for Windows. Features Easy to use for novices. It integrates nicely with Windows Explorer and made easy for novices.Strong and proven algorithms to protect your sensitive documents (20 encryption algorithms).File and/or text encryption.Symmetric and asymmetric algorithms (17 data destruction algorithms).Secure file deletion.Using USB flash
  8. Advanced Encryption Package 2014 Professional 5.95 Encryption Software - File encryption, Secure File Transfer, Batch File Encryption and Encrypted Backups - Advanced Encryption Package 2014 Professional - award-winning easy-to-use file encryption software for Windows. Features Easy to use for novices. It integrates nicely with Windows Explorer and made easy for novices.Strong and proven algorithms to protect your sensitive documents (20 encryption algorithms).File and/or text encryption.Symmetric and asymmetric algorithms (17 data destruction algorithms).Secure file deletion.Using USB flas
  9. In 2012, New Zealand police seized computer drives belonging to Kim Dotcom, copies of which were unlawfully given to the FBI. Dotcom wants access to the seized content but the drives are encrypted. A judge has now ruled that even if the Megaupload founder supplies the passwords, they cannot subsequently be forwarded to the FBI. During the raid more than two years ago on his now-famous mansion, police in New Zealand seized 135 computers and drives belonging to Kim Dotcom. In May 2012 during a hearing at Auckland’s High Court, lawyer Paul Davison QC demanded access to the data stored on the c
  10. Jetico BestCrypt Volume Encryption 3.60.21 Multilingual | 6.34 MB BestCrypt Volume Encryption – This is the first program that opens a new class of product that encrypts disk volumes (Disk Volume Encryption). With this software users can encrypt the disk partitions as usual, and modern disk volumes located on different disks, such as overlapping of volumes (Spanned volumes), Striped (Striped), Mirror (Mirrored) and RAID-5 volume. BestCrypt Volume Encryption is easy to install and easy to use. With BestCrypt Volume Encryption can encrypt volumes of users and access them without keeping
  11. GiliSoft Full Disk Encryption 3.3.1 GiliSoft Full Disk Encryption's offers encryption of all disk partitions, including the system partition.Through password protecting a disk, disk partition or operating system launch, the program disables any unauthorized reading/writing activity on your disk or PC, restricts access and launch of specific disks and files. It provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identit
  12. Data's encrypted in your browser before it even gets to the server. The cleverest clogs of MIT have squared up to the NSA after claiming to have developed a PRISM-proof encryption system. Dubbed Mylar, the spook-bane allows devs to build web applications which are protected from attackers, even if they have access to the server that stores the software. Its creators were upset that anyone who had access to a server, be they "an attacker, a curious administrator, or a government", were able to run riot through the data stored on there. “You don’t notice any difference, but your data gets encryp
  13. Read about five most popular and chosen by community as the most secure/trusted VPN Service Providers: Private Internet AccessTorGuardIPVanishDIYCyberGhostThere is a vote as well in order to determine the winner. Source
×
×
  • Create New...