Security flaw found in Networks Associates' PGP
Related Articles
- PGP 6.0: Pro Crypto Suite Gets Personal. Del Torto, Dave // PCWorld;Jan1999, Vol. 17 Issue 1, p76
Reviews Network Associates' PGP for Personal Privacy 6.0, a software program for file encryption and digital signatures. Features; Price; Company contact information. INSET: Quick Takes, by Yardena Arar.
- PGP brings security to masses. McClure, Stuart // InfoWorld;10/05/98, Vol. 20 Issue 40, p44C
Highlights the security features of the PGP Enterprise Security 6.0 public key encryption software developed by Network Associates Inc. Comparison of security capabilities with Entrust Technologies' and VeriSign's PKI solutions; Ease of management; Transport Layer Security support; Computer...
- NAI set to pitch Active Security Network. Kerstetter, Jim // PC Week;03/08/99, Vol. 16 Issue 10, p42
Reports on the plans of Network Associates Inc. (NAI) in 1999. Focus the company is placing on its Active Security Network; How Active Security will be integrated across several of NAI's products including its PGP encryption software.
- NAI boosts Pretty Good Privacy pack. Nelson, Matthew // InfoWorld;05/10/99, Vol. 21 Issue 19, p12
Reports that Network Associates Inc. will release several features to be added to its Pretty Good Privacy (PGP) suite of encryption products at the 1999 NetWorld+Interop conference. Planned release of Versions 6.5 of both PGP Enterprise Security and PGP Command Line software products;...
- Why a £75 outlay could have saved Nationwide £1,m. McKelvey, Charlie // Precision Marketing;2/23/2007, Vol. 19 Issue 9, p12
The article introduces encryption software as a solution to computer data leakage in Great Britain. The author claims that with the boom of computer technology, data thefts has been rampant , and needs action from the government. Due to information losses, some companies have experienced several...
- Key recovery moves ahead. Moeller, Michael // PC Week;12/23/96, Vol. 13 Issue 51, p36
Reports on the decision by over 20 companies to join the Security Alliance initiative to develop a computer encryption program for documents and messages sent over computers. The Alliance's Key Recovery plan; A list of some of the companies that have joined; What companies are looking for.
- Digest. // PC Week;08/30/99, Vol. 16 Issue 35, p25
Relates news briefs regarding computers for August 1999. The release of sales figures from the first half of 1999 on groupware such as Microsoft Exchange and Lotus Notes; A theoretical device by Adi Shamir, co-creator of public-key algorithm, that could weaken RSA key computer security.
- Encrypt your data. Bradley, Helen // Australian PC User;Aug2005, Vol. 17 Issue 8, p121
Shows how to secure data using the Paragon Encrypted Disk software. Significance of using an encrypted disk; Steps in creating a new encrypted disk.
- No fear peer-to-peer. Warne, Dan // Australian Personal Computer;Oct2003, Vol. 23 Issue 10, p148
With the copyright police increasing its monitoring of popular file-sharing networks like KaZaA and eDonkey, savvy users are turning to WASTE, a new program that relies on file encryption and ad hoc networks of trusted members to escape prying eyes. What makes WASTE different from other...