Search Details

Word: encryption (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...second possibility is to implement softwaremaking "encrypted networking" possible. Thissoftware would encrypt all information passingbetween a user's computer and the network. Thesoftware is expensive, however, and may be subjectto government regulations...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

Until then, you can do a few simple things to minimize the chances of someone sniffing your data. There are telnet programs available that encrypt your session (one example is SecureCRT, whose demo is available at www.tucows.com...

Author: NO WRITER ATTRIBUTED | Title: BARATUNDE R. THURSTON'S TechTalk | 9/29/1998 | See Source »

DIED. FRANK ROWLETT, 90, nimble-minded cryptographer who cracked a Japanese diplomatic code used to encrypt dispatches between Tokyo and Japan's ambassador in Berlin during World War II; in Gaithersburg, Md. One of the messages Rowlett and his team deciphered detailed German defenses against the anticipated Allied invasion of Berlin...

Author: /time Magazine | Title: Milestones Jul. 13, 1998 | 7/13/1998 | See Source »

...registrar's office will send the data to the Science Center on a direct, secure line and will encrypt the information, meaning it will be scrambled and rendered unreadable without specific codes and proper decoding tools...

Author: By Matthew W. Granade, | Title: Registrar Will Provide Online Grade Access | 8/1/1997 | See Source »

...there is a problem with this method. It is only effective when you write to those people to whom you've given keys. How do you give the key to someone? E-mail it to them. But e-mail isn't private unless you encrypt it. We've come full circle without accomplishing anything...

Author: By Eugene Koh, | Title: ON TECHNOLOGY | 2/22/1995 | See Source »

| 1 | 2 | 3 | 4 | 5 | 6 | Next