Not entirely sure how cryptography works? This document’s two chapters, The Basics of Cryptography and Phil Zimmermann on PGP, will tell you what you need to know.
ftp.pgpi.org (PDF file, 1007 kb)
“Little understood by the outside world, the community of Linux programmers has evolved in recent years into something much more mature, organized, and efficient. Put bluntly, Linux has turned pro.” Steve Hamm takes you on a tour of what has become the Linux phenomenon.
“I don’t want people reading my mail.” Roy Hoobler explains how to use KGPG for email and file encryption under KDE.
“It sounds like science fiction, but it’s true.” Andrew Bomford first published this article in November 1999. Will matters have improved since then?
Academics warn of an increasing divide between those able to pay for online educational content and those who are not.
“It is ironic that a fear of technology has sent thousands of companies hurtling into the arms of an IT vendor that has some of the most complex, resource hungry and insecure server technology on the market.” Malcolm Cartledge prefers low cost and high reliability.
Kelly Martin has become the victim of identity theft. A security professional by trade, he reflects on the many ways that personal data, stored on your computer, can fall into the wrong hands.
For a conclusive answer read this article by Phil Zimmermann, author of the Pretty Good Privacy application.
“Once your email address is in the hands of spammers, regaining control of your inbox is a very, very difficult job indeed.” Nobody likes to receive spam, but what can you do to avoid it? Essential reading for anyone keen to ‘throw a spammer’ in the works.