Better Than Invisible Ink?

Kwak, Mary
June 2000
Inc.;2000 Inc. Technology 2, Vol. 22 Issue 9, p32
Focuses on Disappearing Incorporated's Disappearing Email which encrypts each E-mail message and assigns it a 128-bit key, essentially a code that `unlocks' the encryption. Cost of the software per mailbox per month; Result of the test of the software conducted by Boro Marinkovich at his BBM Solutions, a Toronto-based systems integrator.


Related Articles

  • Eze Castle Consulting unveils real-time chat software. Dabaie, Michael; Stirland, Sarah; Forman, Michael; Burger, Andrew // Securities Industry News;07/12/99, Vol. 11 Issue 27, p11 

    Features Eze Castle Consulting's Ez-Exchange encrypted chat software.

  • First cross-certification package on tap.  // PC Week;03/24/97, Vol. 14 Issue 12, p3 

    Informs that Xcert Software plans to create the first cross-authentication between different certificate authorities. The use of Lightweight Directory Access Protocol (LDAP); The need for Xcert's Sentry CA to be installed at both sites.

  • McAfee PGP Personal Edition. Mills, Ashton // Australian Personal Computer;Jul98, Vol. 19 Issue 7, p34 

    Focuses on the encryption computer software PGP Personal Edition by the Network Associates company. Precaution taken by the United States in relation to the exportation of PGP (Pretty Good Privacy) systems; Functions of the PGP personal edition; Features of the software; What the encryption in...

  • IBM key recovery kit goes to beta. Moeller, Michael // PC Week;05/26/97, Vol. 14 Issue 21, p6 

    Informs that International Business Machines Corp. released a beta version of SecureWay Key Management Framework Toolkit, a key recovery incorporation facilitator for computer data encryption. Features.

  • McAfee exports 56-bit encryption technology.  // PC Week;04/07/97, Vol. 14 Issue 14, p66 

    Reports that McAfee Associates Inc. will begin to ship its Desktop Security Suite, a 56-bit encryption software, after it receives approval from the United States government. Features and capabilities of the software; Price and contact information.

  • How to protect TCP/IP packets from pilferage. Phillips, Ken // PC Week;2/10/97, Vol. 14 Issue 6, p73 

    Provides an analysis of NetCrypto 1.0, an encryption tool for safeguarding Transmission Control Protocol/Internet Protocol (TCP/IP) data transmissions from McAfee Associates Inc. The lack of encryption software for transmissions besides electronic mail (E-mail); Features and capabilities of the...

  • RecoverKey unlocks data. Phillips, Ken // PC Week;09/15/97, Vol. 14 Issue 39, p138 

    Discusses why Trusted Information Systems Inc.'s RecoverKey technology is being rapidly adopted by the encryption industry as of September 15, 1997. Benefits of the technology, including the recovery of data from encrypted files, drives and E-mail; Discussion of symmetric and asymmetric...

  • Rijndael scrambles in as next-gen AES. Parks, Manish // eWeek;10/23/2000, Vol. 17 Issue 43, p95 

    Focuses on the Rijndael computer encryption technology. Features and functions; Strengths and weaknesses; Comparison with other encryption technologies.

  • Tool of the week. Louderback, Jim // PC Week;10/13/97, Vol. 14 Issue 43, p23 

    Mentions WinCode, a free download from Snappy Software that makes encoding and decoding of files simple. Where to get WinCode.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics