News

In our previous installment in the encryption series, we looked at how you could encrypt your files using PGP. Apps that use the PGP technology have several advantages over other encryption ...
PGP’s major attraction is that it uses public key cryptography, allowing you to exchange encrypted files without having to swap private, or secret key information with the other party.
You may think that encrypting your sensitive files with, say, PGP may protect your data - but you'd be wrong. Most encryption formats leak a lot of plaintext metadata, and that's a problem. Here's ...
I've been looking around the internet for an example that shows how to encrypt a file with an existing PGP public key that was sent to me. The examples I find generate the key pair on the fly and ...
Although I’ve yet to see the one product that can encrypt data on all OSes and media, PGP’s suite of encryption products offers a competitive enterprise solution to protect a variety of ...
GnuPG, the open replacement for PGP, is an excellent tool to manage cryptographic signatures to files or e-mails for validity and integrity, as well as a tool to encrypt and decrypt sensitive ...
PGP runs into problems when it tries to encrypt or decrypt files that have names longer than 200 characters. When PGP attempts to decrypt the files, a buffer overflow causes it to crash.
PGP Corp. is shipping updates to both its desktop and server encryption products aimed at centralizing policy management and expanding enterprise management features. PGP Desktop 9.0 now works ...