False security

Steinberg, Gene
November 1995
Macworld;Nov95, Vol. 12 Issue 11, p118
Examines the integrity of the built-in security features of eight of the most popular Macintosh software. Password protection; Document encryption. INSETS: The search for backdoors (recovery of passwords).;High-security software..


Related Articles

  • How to...  // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2013, p6 

    The article presents tips on ensuring password security including creating strong and long passwords by using long phrases, implementing password manager software for encrypting and storing all logins, and never duplicating passwords across accounts.

  • ANSWER LINE. SPECTOR, LINCOLN // PCWorld;Jan2013, Vol. 31 Issue 1, p89 

    The article presents an answer as to the best method of sending private information safely over the Internet, including the use of compressed data encryption which would require the recipient having the encryption password, or the use of the cloud-based service Sendinc.com.

  • Novell's Remote encrypted password falls victim to weak security measures. McClure, Stuart; Scambray, Joel // InfoWorld;04/26/99, Vol. 21 Issue 17, p44 

    Reveals the netware encrypted remote password in Novell servers. Way to encrypt the password; How the password works; Files where the encrypted password is usually stored.

  • Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2. Dey, Somdip // International Journal of Cyber-Security & Digital Forensics;Sep2012, Vol. 1 Issue 3, p221 

    In this paper, the author presents an advanced version of image encryption technique, which is itself an upgraded version of SD-EI image encryption method. In this new method, SD-EI Ver-2, there are more bit wise manipulations compared to original SD-EI method. The proposed method consist of...

  • Password-Based Encryption.  // Network Dictionary;2007, p368 

    A definition of the term "password-based encryption," in relation to computer security, is presented. It refers to a technique for generating a cryptographic key from a password.

  • Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures. Lozhnikov, Pavel; Sulavko, Alexey; Eremenko, Alexander; Volkov, Danil // Information (2078-2489);Dec2016, Vol. 7 Issue 4, p1 

    The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the identities. When a user is authenticated by...

  • United States takes another crack at encryption-export policy. Cravotta; Granville, Nicholas // EDN;10/28/99, Vol. 44 Issue 22, p26 

    Presents proposed changes to encryption-export policy in the United States (US). Permission of US companies to export encryption commodity or software of any key length; Use of any encryption commodity or software to provide services; Requisite of postexport reporting for non-US entity of any...

  • A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography. MINHO KIM; ÇETIN KAYA KOÇ // Journal of Information Science & Engineering;Jul2008, Vol. 24 Issue 4, p1213 

    Secure communication is an important issue in networks and user authentication is a very important part of the security Several strong-password authentication protocols have been introduced, but "there is no fully secure authentication scheme that can resist all known attacks. We propose...

  • Low-Power Design of Hardware One-Time Password Generators for Card-Type OTPs. Sung-Jae Lee; Jae Seong Lee; Mun-Kyu Lee; Sang Jin Lee; Doo-Ho Choi; Dong Kyue Kim // ETRI Journal;Aug2011, Vol. 33 Issue 4, p611 

    Since card-type one-time password (OTP) generators became available, power and area consumption has been one of the main issues of hardware OTPs. Because relatively smaller batteries and smaller chip areas are available for this type of OTP compared to existing token-type OTPs, it is necessary...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics