51 Results for:MIME
- Sort by:
Email attachment risks highlight value of collaboration tools
13 May 2011This week at Interop Las Vegas, I met Dusan Vitek, vice president of worldwide marketing at Kerio Technologies Inc., who said, "I feel guilty whenever I send an email with an attachment." I ... Read More
How and when to enable hardware-based TPM security on servers
11 Oct 2013Most servers include a Trusted Platform Module, but you only want to turn it on and manage TPM when the server handles high-value encrypted workloads. Read More
Is Triple DES a more secure encryption scheme than DUKPT?
27 Mar 2008Both DES and TDES use a symmetric key, but Michael Cobb explains their separate and distinct roles in protecting financial transactions. Read More
JSR-286 development tutorial: An introduction to portlet programming
16 May 2013This portlet programming tutorial is an introduction to developing JSR-286 applications that can be deployed to any standards-based portal server. Read More
Security and the TCP/IP stack
22 Jun 2006Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Read More
Pop quiz: E-mail security
20 Jul 2005Find out how much you know about securing your organization's e-mail. Read More