Privacy software

Results: 6129



#Item
811Computing / PGP / Privacy software / Public-key cryptography / Email authentication / GNU Privacy Guard / Pretty Good Privacy / Crypt / GNU Free Documentation License / Cryptography / Computer security / Cryptographic software

Replacing PGP 2.x with GnuPG This article is based on an earlier PGP 2.x/GnuPG compatability guide (http://www.toehold.com/~kyle/pgpcompat.html) written by Kyle Hasselbacher (<>). Mike Ashley (Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:34:54
812Internet privacy / Intranet / Operating system / System administrator / Server / X Window System / CompTIA / Project management software / Computing / Software / System software

David Christie & Associates P/L Private & Confidential < DATE @ "d-MMM-yy" * MERGEFORMAT >18-Apr-01 For further information please call David Christie & Associates P/L on < FILENAME * MERGEFORMAT >IT O

Add to Reading List

Source URL: www.careercafe.com.au

Language: English - Date: 2010-06-14 11:07:47
813Business / Human–computer interaction / Computer networks / Internet privacy / Computer-mediated communication / Intranet / Collaborative software / Knowledge management / World Wide Fund for Nature / Collaboration / Groupware / Computing

KM CASE STUDY (AUGUSTCollaboration: leading by example

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 02:36:47
814Cross-platform software / Web 2.0 / Gmail / Internet privacy / Webmail / Fax / Almaty / Email / Radio / Technology / Computing / Internet

X “EURASIA” INTERNATIONAL FILM FESTIVALSEPTEMBER, 2014 ALMATY, KAZAKHSTAN

Add to Reading List

Source URL: eurasiaiff.kz

Language: English - Date: 2014-08-14 00:03:42
815Internet privacy / Webmail / World Wide Web / Computing / Internet / Cross-platform software / Web 2.0 / Gmail

Educational Material for Cross-cultural Understanding The main goal of this project is to provide basic cultural information to elementary school students, between the ages of 6 – 12, which will be used by all ex-parti

Add to Reading List

Source URL: www.swyaa.org

Language: English - Date: 2012-04-02 02:00:30
816System software / Tor / Anonymizer / Node / Onion routing / Freenet / Peer-to-peer / Session / Proxy server / Internet privacy / Computing / Software

Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier1,2 and Paul Syverson3 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2006-10-20 01:26:00
817Rogue software / Spyware / Adware / Computer network security / Claria Corporation / Zango / Privacy-invasive software / Espionage / System software / Malware

http://www.latimes.com/technology/la-na-spyware26nov26,1,267008

Add to Reading List

Source URL: www.aumha.org

Language: English - Date: 2005-04-06 04:08:00
818Human–computer interaction / Internet / P3P / FTP clients / Internet privacy / Privacy / CUPS / Computing / World Wide Web / Software

P3P Deployment on Websites Lorrie Faith Cranor a , Serge Egelman a,∗ , Steve Sheng a , Aleecia M. McDonald a , and Abdur Chowdhury b a Carnegie b Illinois

Add to Reading List

Source URL: www.chariotsfire.com

Language: English - Date: 2014-01-01 11:16:46
819Computer network security / Internet censorship / Internet privacy / Computer security / Anti-spam / Proxy server / Content-control software / Content filtering / Deep packet inspection / Computing / Spam filtering / Internet

Breaking the DSL Speed Barrier

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2009-03-05 23:41:39
820Scripting languages / Android / Dalvik / Java virtual machine / Smartphones / Java / Lua / Middleware / The Taint / Computing / Software / Cross-platform software

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones William Enck The Pennsylvania State University Landon P. Cox Duke University

Add to Reading List

Source URL: www.enck.org

Language: English
UPDATE