Cryptography - Page 60.5
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Gateway and eSoft will collaborate to bring business applications to Linux. "eSoft, Inc. (Nasdaq: ESFT), the developer of the TEAM Internet Linux software suite, announced a strategic alliance Wednesday with Gateway, Inc. (NYSE: GTW) to advance Linux-based Internet software and . . .
Red Hat has released an enterprise version of Linux that is developed to work with specific server applications, such as Oracle 8i, Computer Associates products, and SAP R/3. "The Red Hat Linux Enterprise Edition product line is a collaborative effort . . .
This SecurityPortal article discusses digital signatures, including the problems associated with them, and their adoption in businesses. . . .
One small step backwards in electronic freedom. Thomas C. Greene writes..."FBI Director Louis Freeh remains determined to require cryptography users to register their keys so that the Bureau can crack their secret files whenever a judge can be persuaded . . .
Here's info on a new 3Com ethernet card that has encryption built-in. Does Linux support this card and the encryption features on it? It includes IPSec and 3DES encryption support. Email us at This email address is being protected from spambots. You need JavaScript enabled to view it. and we'll post the . . .
This is a very interesting article about the future of cryptography. David Lammers writes ... "At the Intel Developer Forum, Intel unveiled a copy protection scheme that will add a layer of encryption between the system and . . .
As we know, mobile security is a big problem. Rupert Collins-White writes..."Wireless devices will soon be able to reference digital certificates held on servers, boosting security for mobile e-commerce applications, thanks to version 1.3 of the Wireless Application Protocol . . .
Protecting access to Defense Department information systems with public-key infrastructure software tokens presents an "enormous problem'" because of the scale of the effort involved in issuing digital certificates to a uniformed and civilian work force that totals more than a . . .
This E-Commerce Times article writes, "The U.S. government and many states are now passing Uniform Electronic Transaction Act (UETA) laws that recognize the legal validity of electronic signatures and transactions." . . .
The Cleo Products Group have announced they have added "support for the open-source platform to its Cleo 3780Plus product. Cleo 3780Plus, which will now work with Linux, UNIX and Windows, allows B2B e-commerce operations to exchange such data as . . .
"Separate papers at the FPGA 2000 conference here this week highlighted how programmable logic can be used to create or crack data encryption schemes. One paper outlined attempts to implement a cryptography algorithm in programmable hardware, while another showed how . . .
Part one of this five-part article, found on LinuxToday, discusses what's required to build an e-commerce solution using Linux. . . .
If you're anything like me, you probably hate having to sign things. I can certainly type far faster than I can write by hand, a habit which has reduced my signature to something akin to two squiggly lines. . . .
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.