51 Results for:MIME

  • Sort by: 

Email attachment risks highlight value of collaboration tools

By Wendy Schuchart 13 May 2011

This week at Interop Las Vegas, I met Dusan Vitek, vice president of worldwide marketing at Kerio Technologies Inc., who said, "I feel guilty whenever I send an email with an attachment." I ... Read More

How and when to enable hardware-based TPM security on servers

By Stephen J. Bigelow 11 Oct 2013

Most servers include a Trusted Platform Module, but you only want to turn it on and manage TPM when the server handles high-value encrypted workloads. Read More

Is Triple DES a more secure encryption scheme than DUKPT?

By Michael Cobb 27 Mar 2008

Both DES and TDES use a symmetric key, but Michael Cobb explains their separate and distinct roles in protecting financial transactions. Read More

JSR-286 development tutorial: An introduction to portlet programming

By Cameron McKenzie 16 May 2013

This portlet programming tutorial is an introduction to developing JSR-286 applications that can be deployed to any standards-based portal server. Read More

Security and the TCP/IP stack

By Michael Gregg 22 Jun 2006

Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Read More

Networks news in brief

07 Mar 2006

Short takes from this week's network news Read More

Pop quiz: E-mail security

20 Jul 2005

Find out how much you know about securing your organization's e-mail. Read More