Results for: encrypt Search Results
Family Filter:
4:03
See how to Encrypt and Lock your USB Disk! Data added to the USB disk anytime after this process will automaticaly be encrypted. This is 100% safe and secure. Carry your data around safely. Even if your disk is stolen your data will not be accessible by anyone. Use a password and/or any normal file as a key to open your disk. This is amazing stuff.
4 Dec 2006
367
Share Video

1:53
Learn how to encrypt and secure your files in Windows XP and leave the hackers in dust! Simple, Easy and Fun...........!!
11 Dec 2006
3925
Share Video

3:43
Want to send encrypted mail from any service provider like Yahoo!, Gmail, Hotmail without any provider support for encryption or any additional required encryption software? This video tutorial will help you make 256BIT encrypted messages/files which you can send over the Internet without any one intercepting it. With 256Bit encryption a supercomputer will take years to break. I teach you a very simple, time saving and efficient method to encrypt your secrets which only you and the intended person can share!
29 Aug 2007
2691
Share Video

11:28
*******live.pirillo**** - PGP's "Whole Disc Encryption" sounds like a good idea. Everything is protected! But, what about the drawbacks of that? What about the fact that it's considered a 'feature'... one that can be disabled anytime a user chooses?
11 Nov 2007
870
Share Video

4:57
This shows how to use free software called Truecrypt to quickly and reliably secure your data with solid levels of encryption
23 Dec 2007
529
Share Video

1:14
This movie shows how to encrypt a file and how to decrypt it.
1 Apr 2008
16272
Share Video

2:17
SecurStar GmbH is a German computer security company founded by Wilfried Hafner in 2001, from the fusion of ScramDisk Inc., Software Professionals Ltd., and Telstar Industries. SecurStar was primarily established owing to the special security needs of telephone companies such as Global Telecom, manufacturing industries such as Centurion Technologies, and state defense departments of several countries. With this fusion, SecurStar evolved into a leading IT-security company known for developing some of the best encryption software in the industry. Its major business activities are : · Development and production of cryptographic software/hardware for telephone and whole disk encryption, · Research and manufacturing of new IT-security systems (software and hardware based), · Consultancy in the field of data security, · Computer and network security, · Programming services
14 May 2008
472
Share Video

2:01
Ideal to encrypt USB-disks/sticks, secondary disks /partitions, CDs, DVDs, containers etc. DriveCrypt also allows to hide data in music files and create hidden containers/ partitions: By entering the correct password, the disks open, if however you are forced to reveal a password, you could reveal a pre-configured "fake" password and the disk will open showing fake, prepared information.
14 May 2011
439
Share Video

2:20
Ideal to encrypt an entire computer /notebook/ partition or just a single Hard drive. With DCPP the Hard drive (including the operating system) is encrypted 100%, therefore unauthorized person will not be able to see even temporary files, installs software etc. DriveCrypt also allows to create a hidden operating system: By entering the correct password, the disks are open, if however you are forced to reveal a password, you could reveal a pre-configured "fake" password and the disk will open showing fake, prepared information.
7 Mar 2009
581
Share Video

2:18
Phonecrypt is a new and innovative software solution for mobile phones providing for tap-proof and encrypted phone calls as well as SMS messages with other mobile phone users. This solution works with a 4096 bit RSA and 256 Bit AES military grade encryption, thus ensuring that business and private telephone conversations remain completely private and tap-proof.
26 May 2008
1456
Share Video

5:26
This video features a demonstration of CMS ABS-Secure Encrypted Backup Solutions for laptops. More information on these unique backup systems can be found on our web site at: *******www.cmsproducts****/product_abs-secure.htm
30 May 2008
735
Share Video

4:57
In this video I will show you how to use Ardamax to create a remote instalation package, encrypt it, bind it to another program and send it.
22 Sep 2008
4843
Share Video

4:34
This is a video tutorial that teaches how to install GPG4win and FireGPG on your computer in order to send and receive encrypted e-mail through gmail. It is very easy and quick way to send private messages.
27 Jun 2008
3766
Share Video

8:13
In this video demo, we show you how easy it is to transfer all of your data onto a fully encrypted hard drive, thereby securing the contents of your laptop. *******www.cmsproducts****/products/easybundle_notebook_upgrade_kits.html
28 Aug 2008
131
Share Video

5:33
Summary: VSN is a plug-in for Outlook/Outlook Express that makes for sending and receiving encrypted emails literally a snap. There is a Web portal for users outside the enterprise, and a secure file transfer application add-on to Windows Explorer as well. Advantages: VSN is extremely easy to use once setup. Enterprises should consider VSN if they are looking for more control over things like user experience, which help desk number to call, control over cryptographic elements like root certificates, integration with other systems like Blackberry Enterprise Server. Also, if they are looking to off-load managing third-party authentication and providing help desk support, then VSN should be on your radar. Disadvantages: You will probably need to coordinate the installation among several different IT departments. The online documentation is somewhat confusing. Voltage Security Inc. 4005 Miranda Avenue #210, Palo Alto, CA 94304 (650) 543-1280, *******voltage****/products/vsn.htm Requirements: Windows only, works with Outlook (2000-2007), Outlook Express and Vista Mail applications Price: $65 per seat per year, includes both secure email and secure file transfer
15 Sep 2008
307
Share Video

0:52
When modify or save file, you can encrypt the file by imputing password, so can guarantee the security of our customer' drawings. Encryption algorithm is completely compatible with AutoCAD, namely encryption graphic file of GStarICAD and the AutoCAD may be saved and opened mutually.
28 Nov 2008
839
Share Video