One of the fundamental principles of the UK Data Protection Act states that:
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Article 17 of EU Directive 95/46/EC 1995 enforces similar requirements for the security of personal data. In today's internet world where organisations are using email to deliver information, what technology is available to ensure that we comply with the law ?
RSA Encryption - the security invention which makes the internet work commercially
Every time you use a credit card you are depending on RSA Encryption to protect you. Its interesting that such a pervasive and critical technology is so little known.
RSA was developed in the 1970's by three American mathematicians and is today the basis of all financial transactions on the internet. This is due to its unique ability to encrypt a file specifically for another person to open. Its interesting to note that a British mathematician discovered it first but never published it.
RSA is unique. All other encryption systems use the same key to encrypt as to decrypt, just like a normal lock and key. RSA splits the key into two, an En-cryption key (the public key because who cares what you En-crypt) and a De-cryption key (private key). Anyone can En-crypt a file for you (using your public key) but only you can De-crypt it (using your private key).
It is accepted by mathematicians that provided a large key length is used, RSA is impossible to crack. The basis of this lies in number theory and has to do with the extreme difficulty of factoring large numbers.
Free download from Shareware Connection - Free license is not time-limited and provides many useful security features, including RSA encryption of your personal files to a Data Vault. Also with FREE license you can SIGN & ENCRYPT files for email attachment or for safe keeping on memory stick
SNMP Explorer - SNMP Explorer extracts or "walks" the MIB of a selected SNMP agent system and creates a structured view of the agent\'s MIB. A tree view of the MIB allows quick exploration of the MIB to locate objects of interest.
PageR Enterprise Network Monitoring - PageR monitors Windows XP, Windows Vista, Windows 2003, Windows 2008 and Windows 7. Monitored Object types can be chosen to Monitor Windows Services, Disc Space, Disc Drives, Windows Event Logs, Windows Folders, Web Pages, Disc Files, Windows Process
Temperature Monitor Gold - Temperature Monitor features Real Time Temperature Display and data logging.
Person To Person Email Security - Person To Person has an Outlook Toolbar which makes Outlook encryption very easy
!Remove Access Passwords!
Network Share Brute Forcer
Advanced Archive Password Recovery
MMIP Anonymity - Hide IP Address
Lock my Folder
Password Recovery Pro
Lost Password Recovery
MSN Messenger Password Recovery
Email Password Recovery Master
KGB Free Key Logger
Thunderbird Email Data Extractor - best software for extracts email addresses from mozilla thunderbird.Email Spider
Secure File Vault - Secure File Vault is a file and folder locker software incorporating email and data encryption. It has security features like file locker,security vault, email encryption. Other features include password manager,file shredder and favorites manager.
Email and Data Extractor Pro - Email Data Extractor Pro can get e-mails, web pages, or any informations.
EagleEyeOS Professional - Powerful and flexible security solution against data leakage. The program provides full-scale protection; it uniquely combines file lifecycle tracking with portable data stores and rights management for files.
Absolute Data extractor - Email Data Extractor Pro can get e-mails, web pages, or any informations.
Shareware Connection periodically updates pricing and software information of 'PTP Security' from company source 'CPL Systems' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'PTP Security' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of PTP Security.