encryption

Thu
22
Dec
Dennis Faas's picture

'Encryption Pack For Ms Office', and 'Expired Cookies Cleaner'

Encryption Pack for Ms Office MS Office offers a simple way to protect a document by using a password entry. This provides a basic security for MS Word, Excel documents (.DOC, .XLS, .PPT) from unauthorized access. But security specialists do not ... recommend to use build-in MS Office security features. For example: take a quick browse through Google and you'll be able to turn up as many MS Office password crackers as you like. Encryption Pack for MS Office, on the other hand, is a great way to protect your documents using strong encryption. http://www.rohos.com/encryption-pack/ Expired Cookies ... (view more)

Fri
25
Nov
Dennis Faas's picture

Password Saver Review

Synopsis: Password Saver is a powerful, feature-rich solution for storing all your password information in a secure, centralized database on your hard drive. It uses industrial strength 256-bit encryption to keep your passwords secure, while ... providing an easy-to-use interface for organizing, adding and editing your password records. Password Saver provides many pre-defined templates for commonly used records such as web site and email accounts, so you can get started adding data right away. Password Saver's advanced import/export features also let you share passwords with co-workers and ... (view more)

Wed
10
Aug
Dennis Faas's picture

Dictionary Attack

A dictionary attack refers to the general technique of trying to guess some secret by running through a list of likely possibilities, often a list of words from a dictionary. It contrasts to a brute force attack in which all possibilities are tried. ... The attack works because users often choose easy-to-guess passwords, even after being exhorted against doing so. Dictionary (and brute force) attacks may be applied in two main situations: in cryptanalysis, in trying to determine the key needed to decrypt a given piece of encrypted data; in computer security, in trying to gain unauthorized access ... (view more)

Tue
15
Mar
Dennis Faas's picture

Genie Backup Manager Review

The last three articles in our newsletter have provided an in-depth look into The Importance of Backing up Data , highlighted a number of Backup Strategies , and even presented a Six Point Guide to Buying Backup Software . At the same time the ... articles were being compiled, however, I quietly enlisted myself on a top secret mission to research, review, and rigorously test a never-ending list of backup software. The purpose: to find the best, easiest to use, feature-packed backup utility according to the stringent set of criteria previously established in our 6 Point Purchasing Guide (namely: ... (view more)

Wed
24
Sep
Dennis Faas's picture

AccountLogon Review

I visit dozens of web sites daily, and many of them require a username and password. I once used RoboForm to manage my passwords and form field data. Recently, I discovered a program called AccountLogon which organizes my password information and ... protects my data with 448-bit ["blowfish"] encryption -- an encryption level higher than RoboForm Pro (3DES). Side note: A higher encryption level means greater security. In short, it would take a very skilled hacker to "crack" an encrypted 3DES file, and much (much!) longer to crack a 448-bit blowfish encrypted file. What is ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)

Pages

Subscribe to RSS - encryption