Protect Software

Results: 516



#Item
51Software / Tunneling protocols / Disk encryption / Windows Server / Windows Vista / OpenVPN / Virtual private network / BitLocker Drive Encryption / Hamachi / Computer network security / Computing / Computer security

Lock down Your Laptop Smart Card Creating a Windows Login Password Lock your laptop by making sure that your Windows user account is set up to require a password on log- in. A log- in password won’t protect against an

Add to Reading List

Source URL: www.cannon.af.mil

Language: English - Date: 2014-12-03 12:43:09
52Internet privacy / Facebook / Web 2.0 / Web analytics / Google Analytics / HTTP cookie / Like button / Google / Privacy / Computing / Software / World Wide Web

Privacy policy We are absolutely committed to protect your privacy We appreciate your interest in our company and products, and want you to know that your personal data is absolutely safe when you visit our websites. Ou

Add to Reading List

Source URL: www.dreve.de

Language: English - Date: 2014-03-18 09:01:08
53Computer hardware / Windows XP / USB flash drive / Universal Serial Bus / AutoRun / Windows Vista / Windows / Data loss prevention software / USB mass-storage device class / Microsoft Windows / Computer security / Computing

Wave Protector Port & Device Control and Removable Media Encryption p Protect your enterprise from data leakage and theft

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:01
54Software / Remote backup service / Backup / Cloud backup / Continuous data protection / Comparison of online backup services / Uranium Backup / Backup software / Data security / Computing

CLOUD BACKUP SERVICES Etherland Cloud Backup BUILT TO PROTECT BUSINESS BOTH LARGE AND SMALL

Add to Reading List

Source URL: etherland.eu

Language: English - Date: 2015-04-21 09:25:42
55Computer network security / Data management / Crime prevention / National security / Infrastructure optimization / Network performance / Quest Software / Provisioning / Computer security / Computing / Concurrent computing / Distributed computing

DATASHEET Protect Against Internal and External Threats Cybercrime is everywhere, and government agencies are attractive targets for anyone who wants to create havoc for reasons like financial gain, political motivation

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:33
56Homomorphic encryption / Paillier cryptosystem / Deterministic encryption / HTTP Secure / ElGamal encryption / Encryption software / RSA / Cryptography / Public-key cryptography / Cryptographic software

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
57Secure communication / Computing / Technology / Business / Application software / Linoma Software / Managed file transfer

LINOMA SOFTWARE CELEBRATES 20 YEAR ANIVERSARY Linoma Software is celebrating 20 years in helping organizations around the world to automate their IT processes and protect sensitive data. The company will commemorate this

Add to Reading List

Source URL: blog.linomasoftware.com

Language: English - Date: 2014-11-17 15:54:35
58Antivirus software / McAfee / Whitelist / Zero-day attack / Conficker / Spyware / Windows XP / Tencent QQ / Norton AntiVirus / Software / System software / Malware

Technical FAQ Maintain Security for XP Systems Protect end-of-life operating systems with application whitelisting.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:38:03
59Rogue software / Computer network security / Spyware / Computer virus / Real-time protection / Espionage / Malware / System software

Computer Viruses and Spyware Explained What are computer viruses? How do I protect myself? Viruses are programs that people create to

Add to Reading List

Source URL: www.siprofessionals.org

Language: English - Date: 2009-07-07 13:01:26
60Computing / Acronis True Image / Acronis / Remote backup service / Backup / Hyper-V / VMware / Windows Server / Software / Backup software / System software

DATA SHEET Acronis® Backup & Recovery™ 10 Online Your online redundant data store for backup & recovery Are you doing everything you need to protect your information? Local backup and recovery software may allow you

Add to Reading List

Source URL: www.micronexis.com

Language: English - Date: 2013-04-07 05:28:28
UPDATE