Pretty Good Privacy (PGP), once the most popular encryption software, is now much more. Find out how PGP’s protocols captured the email encryption market.
Learn all about Linux, including what goes into a Linux distribution, how Linux is used, how it works, the pros and cons of using Linux and its history.
The Open Web Application Security Project, or OWASP, identifies and ranks top web app security risks -- but that's not all. Discover what else OWASP does.
SSH tunneling enables crossing protected network boundaries and firewalls. Learn how to use three types of SSH tunnels to protect network communications.
Find out how to create an SPF record to prevent email forgery and cut down on spam and phishing by restricting email deliveries to authenticated servers.
Email was designed without security considerations. Email security protocols, including SMPTS, SPF and S/MIME, add mechanisms to keep messaging safe from threats.