Video Screencast Help

Encryption Blog

Results for Encryption Blog

It's been an extraordinarily active week on the cybercrime front and it feels like a good time to initiate a new blog I've been thinking about for some time. For those of us that track cybercrime, identity theft and the other activities of ...
Blog Entry by Doug McLean | 12 Aug 2008 | 0 comments
Decryption Without Key Present The PGPsdk has a feature that allows the Encrypted Session Key (ESK) from a message to be extracted and decrypted separately. The decrypted ESK could then be used later to decrypt the original message. It works as ...
Blog Entry by Doug McLean | 12 Aug 2008 | 0 comments
While products such as PGP Universal and PGP Desktop have done a successful job of protecting email and storage, securing the data presented in web application have largely been unaddressed.  Users of web mail (Gmail), forums, blogs and group calendering ...
Blog Entry by Doug McLean | 25 Jul 2008 | 0 comments
Abstract Access to computer services has conventionally been managed by means of secret passwords and centralized authentication databases. This method dates back to early timeshare systems. Now that applications have shifted to the Internet, it ...
Blog Entry by Doug McLean | 03 Sep 2004 | 1 comment