Tales from the encrypt: the secrets of data p...
This article was first published on guardian.co.uk at 16.52 BST on Tuesday 30 June 2009. ... our dating site today. guardian.co.uk © Guardian News and Media ...
http://www.guardian.co.uk/technology/2009/jun/30/data-protection-internet
popularity:
security
encryption
death
privacy
data
will
law
computers
corydoctorow
family
|
Vanish: Enhancing the Privacy of the Web with Self-Destructing Data
College Facebook posts or pictures can resurface during a job interview; a lost or stolen ... emails maintained by an email provider — against accidental, ...
similarity:
popularity:
security
privacy
encryption
software
data
opensource
vanish
tools
socialnetworking
web
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
The GNU Privacy Guard - GnuPG.org
GnuPG is a complete and free replacement for PGP.
similarity:
popularity:
security
encryption
pgp
software
opensource
privacy
gnu
gpg
cryptography
tools
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
PGP Corporation - Home Page
Helps companies secure e-business operations through firewall, encryption, and intrusion detection.
similarity:
popularity:
security
encryption
pgp
software
privacy
tools
cryptography
internet
email
technology
|
EPIC - Tools for Protecting Online Privacy
The Electronic Privacy Information Center (EPIC) focuses public attention on emerging civil liberties, privacy, First ... Search epic.org. Hot Policy Issues ...
similarity:
popularity:
privacy
security
tools
software
internet
encryption
email
anonymous
utilities
online
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
How to Encrypt and Hide Your Entire Operating System from Prying Eyes
No information avaiable
similarity:
popularity:
security
encryption
privacy
truecrypt
lifehacker
howto
windows
software
computer
linux
|
Axantum Software AB | AxCrypt | File Encryption Software
AxCrypt File Encryption for Windows and Xecrets Online Password Manager by Axantum Software AB ... So far, we have received 1,465,017 registrations, it is ...
similarity:
popularity:
encryption
security
software
freeware
opensource
windows
free
privacy
tools
utilities
|