1. Technology

Articles related to file encryption

Encrypt PowerPoint Presentations - Encryption in PowerPoint
Encryption can be added to PowerPoint to keep others from accessing your presentation(s). Any viewer wishing to open this presentation will have to enter a  ...
How to Encrypt Your Files With TrueCrypt - Mobile Office Technology
Easy step-by-step directions on how to protect your files and folders with the free, open-source encryption program TrueCrypt.
Using Windows EFS (Encrypted File System) - Security - About.com
Windows EFS (Encrypted File System) can help you add extra security and protection for your files to make sure that unauthorized users are unable to view or ...
ENCRYPTED File (What It Is & How To Open One) - PC Support
Did you find an ENCRYPTED file on your computer and wonder what program should open it? Maybe someone emailed you an ENCRYPTED file but you're not  ...
Simple File Encryption / Decryption in Delphi - About.com
File encryption is a process that makes (your) files protected in a way that they cannot be viewed by others. The most common use of file encryption is to protect  ...
Encrypting Files with TrueCrypt Part 2: Create a New File Container
Your 3 options in the wizard are to: a) create a “file container,” which is a virtual disk to store the files and folders you wish to protect, b) format and encrypt an ...
Encrypting Files with TrueCrypt Part 5: Set the Size of Your File ...
Be careful when setting the size of your encrypted file container in TrueCrypt.
File Encrypt / Decrypt - Delphi - About.com
Looking for an easy way to encrypt and protect your data? ... Encryption is the process of converting a file into a format that cannot be read by the applications set ...
Encrypting Files with TrueCrypt Part 4: Select the Volume Type
Click Select File... to choose a filename and location for this file container, which will actually be a file on your hard disk or storage device. Warning: do not select ...
Encrypt Files By Moving Your Mouse - Mobile Office Technology
Encrypt files with random mouse movements in TrueCrypt.
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10      Next

©2014 About.com. All rights reserved.