Disk encryption software

Results: 525



#Item
251Software / System software / BestCrypt / TrueCrypt / On-the-fly encryption / EncFS / Dm-crypt / Filesystem in Userspace / Filesystem-level encryption / Disk encryption / Cryptographic software / Cryptography

GROUP TEST ENCRYPTION ENCRYPTION GROUP TEST Mayank Sharma gathers the best file encryption tools

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2014-11-12 07:50:35
252Scripting languages / Crypt / Disk encryption / Ruby / Test / MD5 / Open / Cryptographic software / Special purpose file systems / Computing / Software engineering / Computer programming

1 GENERAL PURPOSE UTILITIES In any programming language, scripting is the solution to frequently performed tasks. If you find yourself asking Couldn’t a robot or

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
253Cryptographic software / Linux kernel / Application programming interfaces / Unix / Disk encryption / Cryptoloop / Device mapper / Encrypting File System / Loop device / Software / System software / Computer architecture

Cryptoloop HOWTO Ralf Hölzer 2004−01−15 Revision History

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:46
254Computer security / Computing / Computer architecture / NonStop / Security / Encryption / HP StorageWorks / Backup / HP Data Protector / Disk encryption / Cryptography / Cryptographic software

HP NonStop Volume Level Encryption Data sheet More than 20,000 security standards have emerged worldwide and nearly all include requirements to protect data-at-rest from exposure by theft or media

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
255Cryptography / Cross-platform software / Disk encryption / Computer security / Smart card / GNU Privacy Guard / Data security / TrueCrypt / Access control / Software / Cryptographic software / Computing

escrypt GmbH System Provider for Embedded Security A Generic Architecture and Extension of eCryptfs:

Add to Reading List

Source URL: www.linux-kongress.org

Language: English - Date: 2009-10-30 06:39:24
256Cryptography / Cryptographic software / Computer security / Encryption / Information security / Public safety / National security / Network Security & Cryptography / Disk encryption / Security / Data security

UTS 165 Revision May, 2008 Number: Security Practice Bulletin #1 (SPB-1)

Add to Reading List

Source URL: www.utsystem.edu

Language: English - Date: 2014-06-10 13:09:19
257Trusted computing / X86 architecture / Cloud infrastructure / Disk encryption / AES instruction set / Trusted Execution Technology / OpenStack / Intel / Hypervisor / System software / Software / Computing

Open Source on Intel white paper OpenStack* Intel® Xeon® processors

Add to Reading List

Source URL: software.intel.com

Language: English - Date: 2013-12-05 13:47:51
258Disk encryption / Cryptographic software / Windows Vista / Trusted computing / Windows Server / BitLocker Drive Encryption / Trusted Platform Module / Next-Generation Secure Computing Base / Encrypting File System / Microsoft Windows / System software / Software

Secure Startup–Full Volume Encryption: Technical Overview - 20

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-06-22 16:03:10
259System software / Microsoft Windows / Cryptographic software / Backup / Data security / Cloud storage / Uranium Backup / HP Data Protector / Backup software / Disk encryption / Software

Sales T: [removed]E: [removed] Support T: [removed]E: [removed] Device Encryption Key Benefits The service provides encryption of the device and protects the data hosted in it in line with A

Add to Reading List

Source URL: www.adept4.co.uk

Language: English - Date: 2013-04-16 05:33:34
260Espionage / Internet privacy / PGP / Disk encryption / Encryption / Anonymous remailer / Export of cryptography in the United States / Steganography / GNU Privacy Guard / Cryptography / Cryptographic software / Computer security

In recent years, the war over encryption has moved beyond controlling the technology itself. Now, some governments are granting law enforcement agencies new powers and funding the development of new tools td get at comp

Add to Reading List

Source URL: www.ieeeghn.org

Language: English - Date: 2011-05-18 07:34:50
UPDATE