Internet security

Results: 20779



#Item
421Prevention / Security / Data security / Safety / Identity documents / Computer security / National security / Registered Traveler / Transportation Security Administration / Privacy / Internet privacy / Identity theft

Verified Identity Pass, Inc. (“VIP”), the former owner and operator of the Clear Registered Traveler program, ceased operations on June 22, 2009. Through bankruptcy court proceedings, VIP is selling its assets to Alc

Add to Reading List

Source URL: img.clearme.com

Language: English - Date: 2015-08-19 09:50:28
422Computing / Computer network security / Computer security / Computer networking / Internet privacy / Network performance / Proxy server / Firewall / Stateful firewall / SOCKS

Greenshades Software hosts a variety of web pages that are intended for client use, such as GreenEmployee.com, GreenshadesOnline.com, and DownloadMyForm.com. Additionally, many of our software applications run on client-

Add to Reading List

Source URL: www.greenshades.com

Language: English - Date: 2015-10-14 12:18:54
423Cryptography / Free software / Software / Cloud storage / Cryptographic software / OwnCloud / Disk encryption / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-12 11:34:59
424Data security / Data management / Privacy / Identity management / Computing / Medical privacy / Internet privacy / Personally identifiable information / Personal /  Inc. / Information technology

CASE STUDY Mydex enables individuals to exchange personal data with Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-04-22 08:00:52
425Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Internet privacy / Computer security / Usability

Two Experiences Designing for Effective Security Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode and Roberto Silva Filho Institute for Software Research Unive

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
426Computer network security / Computing / Virtual private networks / Computer architecture / Software / Network architecture / Internet privacy / Crypto-anarchism / Internet Connect / Point and click / SoftEther VPN / OpenVPN

Configure a VPN connection in Mac OS X The following guide is based on an English OS X Leopardbut with minor modifications the approach should work for other versions of OS X as well (For some versions it might b

Add to Reading List

Source URL: www.soc.ku.dk

Language: English - Date: 2016-08-22 10:32:30
427Wireless networking / Computing / Wireless / Technology / Wi-Fi / Password / Login / Wireless security / Wi-Fi Direct

Wireless Accessing ConnSCU Internet Wireless from Android (Revision Date: Introduction

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-09-18 16:49:44
428Internet privacy / Computing / Privacy / Computer security / Data security / HTTP cookie / Medical privacy / Information privacy / Personally identifiable information / P3P / Do Not Track legislation

PRIVACY POLICY Effective date: February 11, 2015 Holiday Privacy Statement Holiday Stationstores, Inc., its affiliates and subsidiaries (“Holiday,” “we,” “us,” and “our”) recognize and respect the importa

Add to Reading List

Source URL: www.holidaystationstores.com

Language: English - Date: 2016-06-14 23:35:54
429Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / NLnet / Name server / OpenDNSSEC

dnSSexy a verifying DNS (SEc) proXY Willem Toorop NLnet

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-04-17 19:03:57
430Software / Computer security / System software / Antivirus software / ESET NOD32 / ESET / Spyware / Malware / Avira / Computer virus / Comparison of antivirus software / Norton Internet Security

2014 EDITION Be Safer on the Internet Protect your Mac against malware, as well as Windows- and Linux-targeted threats. Stay clear of all types of malicious code, including viruses, worms, and spyware. Antivirus and An

Add to Reading List

Source URL: cdn3-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:21
UPDATE