Archive by Author

Wireless Encryption and Security Threats

The following are the items most often at risk. * Thieves can steal your sensitive personal and business data. * Harmful viruses and worms can infiltrate your network, even evading your anti-virus sof...

R10Cipher From Arten Science – Encryption at Its Best

Software doesn’t always have to be complicated and, contrary to popular belief, it doesn’t always have to be what I categorise as “bloat-ware“. Very rarely an application comes...

Introduction to Encryption

Have you ever needed to secure your data? Ever lost a USB pen? If so then this article is for you.  Encryption  is the process of breaking up any data and putting it into an unreadable algor...

Hardware Based Encryption Pros and Cons

Data  encryption  was first used by the government, mainly to guard military secrets. In today’s world of Internet businesses, this method of protecting your computer data is being use...

Within WiMAX Encore Encryption

WiMax  Encryption  is the technique used to shelter the discretion of information sinuous between a spreader and a recipient.  Encryption  deals with the blockage of data to be pro...

Data Encryption in USB Sticks

The use of  encryption  has been around for years in one form or another and even dates back to the hieroglyphics of ancient Egypt. However, perhaps the most famous historical use of  e...

It’s Time to Sing the Encryption Song – Again!

Yes, I’m wearing my  encryption  hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft’s latest server product. Then couple that wi...

Credit Card Data Encryption – Getting Started

Credit card data encryption is one of the basics of PCI DSS compliance. In recent years more and more attention has been directed at the need for increased data security. The general gist of the PCI D...

Mail Encryption: Securing Important Files

Modern businesses today operate largely via the internet. Correspondence, inquiries, and transactions are now accomplished using business emails. The risk is great for dubious people hacking through y...