Résultats de la recherche
- Sentinel Installation for Dummies
... be prompted for how to obtain the shared message bus encryption key: Generate random encryption key and save it, you’ll use it later. Click ...
Article - otoquero - 12 Jun 2008 - 10:55am - 1 comment - 1 attachment - 3 groups
- GnuPG (GNU Privacy Guard)
... encrypt data -c, --symmetric encryption only with symmetric cipher -d, --decrypt decrypt ... using "DSA and Elgamal" as this allows you to perform encryption of files whereas the other two options are used for signing data to ...
Article - DamianMyerscough - 1 May 2008 - 12:39pm - 1 comment - 1 attachment - 3 groups
- File System Encryption
... encrypted disk containers. The reason for disk encryption is to protect against malicious users from viewing/stealing your ... Click to view . Figure 1.2: Encryption password. Encrypting Partitions In this section of the ...
Article - DamianMyerscough - 1 May 2008 - 12:38pm - 1 comment - 1 attachment - 3 groups
- Engaging The Juniper VPN SSL Client On A SUSE Box
... Step 2: Create softlinks to the appropriate encryption libraries. I noticed while using strace that the Juniper ...
Article - kryptikos - 21 Apr 2008 - 6:13am - 1 comment - 1 attachment - 3 groups
- ABENDLogFilter Utility
... Novell TCP/IP Stack - Network module (NULL encryption) Version 6.80.01 August 4, 2006 Code Address: 8AEDE000h ... Novell TCP/IP Stack - Transport module (NULL encryption) Version 6.80.02 September 19, 2006 Code Address: 8AF91000h ...
Tool - bkeadle - 16 Apr 2008 - 12:03pm - 1 comment - 1 attachment - 2 groups
- Sentinel Collector for Exchange
... s_EVT, s_MSGID, s_Priority, s_RRS, s_CV1, s_CV2, s_OT, s_Encryption, s_SV, s_LMSGID, s_Subject, s_SUN) Event Tag Mapping: With ... s_EVT, s_MSGID, s_Priority, s_RRS, s_CV1, s_CV2, s_OT, s_Encryption, s_SV, s_LMSGID, s_Subject, s_SUN) Event Tag Mapping: ...
Tool - otoquero - 9 Apr 2008 - 10:45am - 1 comment - 1 attachment - 2 groups
- AppNote: Configuring an IPsec Tunnel between NBM and NSM
... IKE Lifetime: 14400 Secs / 240 Mins / 4 hours IKE Encryption: Triple DES (3DES) IKE integrity: MD5 IKE Group: ... IPsec lifetime: 3600 Secs / 60 mins / 1 hour IPsec encryption : Triple DES (3DES) IPsec integrity: MD5 PFS: enabled ...
Article - gvaidya - 2 Apr 2008 - 11:55am - 1 comment - 1 attachment - 2 groups
- Cool Blog: iFolder 3.6 - Looking *really* good!
... iFolder is genuinely going. First up, lets talk encryption . Of ALL the features in iFolder, this was the one that caused the most discussion. I am happy to report that encryption has returned in 3.6 with a new (stronger) algorithm and a ...
Article - jawilliams - 1 Apr 2008 - 2:19pm - 1 comment - 1 attachment - 2 groups
- Results from Open Call: Laptop Encryption without Active Directory
... Solutions Reader Avijit Sen has a question about data encryption on laptops: "We are a Novell-centric company that relies ... our laptops with some kind of full-disk or user-profile encryption. The problem is that most of the commercial solutions out there ...
Article - Avijit Sen - 14 Mar 2008 - 5:38pm - 1 comment - 1 attachment - 2 groups
- Create Self-Signed Certificate Online
... PKI interface with Certificate Authority, encryption , decryption, signatures... Now, you can have fun with setting up SSL, with encryption, decryption and digital signatures using your certificates! ...
Article - rkalfane - 13 Mar 2008 - 12:24am - 1 comment - 1 attachment - 3 groups