• April 06, 2005 06 Apr'05

    Interview: CEO to say so long to the (ISC)2

    For five years, James E. Duffy has been the face of the (ISC)2 and the CISSP certification. He'd now like to devote more time to being a husband, father and grandfather. Duffy announced in February his decision to retire as CEO and president of the ...  Continue Reading

  • April 06, 2005 06 Apr'05

    New ideas from (ISC)2's new chief

    ORLANDO, Fla. -- Rolf Moulton, CISSP-ISSMP, CISA, CCP, has been steering the ship of the (ISC)2 for about six weeks now. But the new CEO's relationship with the security certification organization goes back a ways. Moulton, who created information ...  Continue Reading

  • April 05, 2005 05 Apr'05

    signature file

    A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.  Continue Reading

  • April 05, 2005 05 Apr'05

    Quiz: Cryptography

    OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message. OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger ...  Continue Reading

  • April 05, 2005 05 Apr'05

    Content Scrambling System (CSS)

    Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.  Continue Reading

  • April 05, 2005 05 Apr'05

    CSS

    Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.  Continue Reading

  • April 05, 2005 05 Apr'05

    Content Scrambling System

    Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives.  Continue Reading

  • April 05, 2005 05 Apr'05

    non-disclosure agreement (NDA)

    A non-disclosure agreement (NDA) is a signed formal agreement in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a ...  Continue Reading

  • April 05, 2005 05 Apr'05

    macro virus

    A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it.  Continue Reading

  • April 05, 2005 05 Apr'05

    NDA

    A non-disclosure agreement (NDA) is a signed formal agreement in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a ...  Continue Reading

  • April 05, 2005 05 Apr'05

    non disclosure agreement

    A non-disclosure agreement (NDA) is a signed formal agreement in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a ...  Continue Reading

  • April 05, 2005 05 Apr'05

    non-disclosure agreement

    A non-disclosure agreement (NDA) is a signed formal agreement in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a ...  Continue Reading

  • April 05, 2005 05 Apr'05

    one-time pad

    In cryptography, a one-time pad is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key.  Continue Reading

  • April 05, 2005 05 Apr'05

    checksum

    A checksum is a count of the number of bits in a transmission unit that is included with the unit so that the receiver can check to see whether the same number of bits arrived.  Continue Reading

  • April 05, 2005 05 Apr'05

    vandal

    A vandal is an executable file, usually an applet or an ActiveX control, associated with a Web page that is designed to be harmful, malicious, or at the very least inconvenient to the user.  Continue Reading

  • April 05, 2005 05 Apr'05

    Melissa virus

    Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-mail program, causes the virus to be resent ...  Continue Reading

  • April 05, 2005 05 Apr'05

    International Data Encryption Algorithm (IDEA)

    IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close