One of the fundamental principles of the UK Data Protection Act states that:
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Article 17 of EU Directive 95/46/EC 1995 enforces similar requirements for the security of personal data. In today's internet world where organisations are using email to deliver information, what technology is available to ensure that we comply with the law ?
RSA Encryption - the security invention which makes the internet work commercially
Every time you use a credit card you are depending on RSA Encryption to protect you. Its interesting that such a pervasive and critical technology is so little known.
RSA was developed in the 1970's by three American mathematicians and is today the basis of all financial transactions on the internet. This is due to its unique ability to encrypt a file specifically for another person to open. Its interesting to note that a British mathematician discovered it first but never published it.
RSA is unique. All other encryption systems use the same key to encrypt as to decrypt, just like a normal lock and key. RSA splits the key into two, an En-cryption key (the public key because who cares what you En-crypt) and a De-cryption key (private key). Anyone can En-crypt a file for you (using your public key) but only you can De-crypt it (using your private key).
It is accepted by mathematicians that provided a large key length is used, RSA is impossible to crack. The basis of this lies in number theory and has to do with the extreme difficulty of factoring large numbers.
Free download from Shareware Connection - Free license is not time-limited and provides many useful security features, including RSA encryption of your personal files to a Data Vault. Also with FREE license you can SIGN & ENCRYPT files for email attachment or for safe keeping on memory stick
SNMP Explorer - SNMP Explorer extracts or "walks" the MIB of a selected SNMP agent system and creates a structured view of the agent\'s MIB. A tree view of the MIB allows quick exploration of the MIB to locate objects of interest.
Temperature Monitor Gold - Temperature Monitor features Real Time Temperature Display and data logging.
PageR Enterprise Network Monitoring - PageR monitors Windows XP, Windows Vista, Windows 2003, Windows 2008 and Windows 7. Monitored Object types can be chosen to Monitor Windows Services, Disc Space, Disc Drives, Windows Event Logs, Windows Folders, Web Pages, Disc Files, Windows Process
Person To Person Email Security - Person To Person has an Outlook Toolbar which makes Outlook encryption very easy
Network Share Brute Forcer
Advanced Archive Password Recovery
MMIP Anonymity - Hide IP Address
Lock my Folder
Password Recovery Pro
Lost Password Recovery
MSN Messenger Password Recovery
Email Password Recovery Master
Visual Zip Password Recovery Processor
Password Protect USB
File & Disk Management
Convert License Limited Wma Files
License Files Shadow Security
Free Navision License Files
Free Php Encrypt License Domain
Free Download License Code Usb Security
Thunderbird Email Data Extractor - best software for extracts email addresses from mozilla thunderbird.Email Spider
Secure File Vault - Secure File Vault is a file and folder locker software incorporating email and data encryption. It has security features like file locker,security vault, email encryption. Other features include password manager,file shredder and favorites manager.
Email and Data Extractor Pro - Email Data Extractor Pro can get e-mails, web pages, or any informations.
EagleEyeOS Professional - Powerful and flexible security solution against data leakage. The program provides full-scale protection; it uniquely combines file lifecycle tracking with portable data stores and rights management for files.
Absolute Data extractor - Email Data Extractor Pro can get e-mails, web pages, or any informations.
Shareware Connection periodically updates pricing and software information of 'PTP Security' from company source 'CPL Systems' , so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using 'PTP Security' crack, password, serial numbers, registration codes, key generators is illegal and prevent future development of PTP Security.
AudioShell - Not every PC user has similar needs. Majority of computer users are content with using media player and converter apps for their media consumption needs. However, there are those audiophiles who are particular about collecting and organizing ...
Tower Toppler - Tower Toppler is a close replica of the retro 1988 game Nebulus for those whom used to play the old nintendo console, The Nintendo Entertainment System (NES). At that, it is worth saying it is a fantastic replica, in fact almost exact except for ...
Simeranya - Simeranya is a music search engine and mp3 tool that allows users to search through a current total of 7 plugin sites and convert the video/audio to mp3 which you can then download. This is particularly useful because it cancels out the need to ...
GloboNote - Globonote is a simple and colourful way to stay organised and up to date with key things like; events, birthdays, reminders and a way to remember details such as passwords. Globenote is a program that allows you to place sticky notes on your ...
Battery Optimizer - There comes a time with your laptop, notebook or net book when the battery life starts to deteriorate. It is then when its a good idea to use a piece of software like the battery optimizer to try and get some life back into it.
Dixie the Nerd - Dixie the Nerd is a point and click game where your aim is to simply, leave school. However, you play as Dixie, a school boy who tries leaving school without having to endure the usual beating from the usual punks, jocks or just general bullies. ...
Mario Tractor - Mario Tractor is a driving flash game in which you have to get at the end of each level with a minimum amount of coins and without tipping your cart. Throughout each level you drive Mario through collecting coins, that are too big for marios ...
SevenTh Browser - There are many browsers out there available to download. Most of these are under the radar and not well publicised. SevenTh browser falls under the category of being a not so popular browser, however, this doesn't mean it has less features ...
1st Choice Clipboard - Well, where can I start. This little piece of software is absolutely amazing. I downloaded it earlier, and have used it so many times.
Ill start with the installation. Completely painless, installs to the destination folder and is ...
Falco Graph Builder - Graphs can be a very effective tool in both business and education, a digital representation of a graph provides users with an accurate scaled drawing of how the outputs vary with the inputs for a particular model. Programs that are able to ...