The purpose of this project is to identify and evaluate encryption software that can be downloaded, free of charge from the web. We scanned the market and found a relatively large number of encryption programs. Of these we selected, based on the criterias: to be able to encrypt on file-, folder- or disk-level, as well as having support for Windows or Linux. We excluded Mac and older systems. The programs would also be free because of the limitations we set before the project began. A paid application (Folder Lock) was added by request from the client. The final selection consisted of six programs. We developed test criterias: usability, functionality and safety. The results are presented in a table. In conclusion, Folder Lock proved to have...
Security is more important than ever, and since we are storing much of our sensitive data on hard dr...
Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as th...
Many systems contain sensitive data such as user credentials used for authentication purposes. For l...
Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when out...
Kryptering används för en mängd olika ändamål idag, till exempel för att elektroniskt signera dokume...
In contemporary encryption the vast amount of text subject to cracking has brought about the demand ...
Att skydda sin information mot offline-attacker och stöld kan vara önskvärt, därför kan man använda ...
Background: A recent study shows that key management in the cooperate world is very painful due to, ...
This thesis compares the impact on disk performance in a GNU/Linux environmentwith three encryption...
When the use of encryption amongst the regular computer user grows morewidespread than ever it makes...
Kryptering har funnits under en lång tid och används i dagslaget till att göra information ej läsbar...
Computer usage is increasing constantly every year and reports of companies that have been targeted ...
Today, it appears that information leaks and security breaches are common occurrences. The authors o...
The goal of this work was to implement a new security protocol by utilising cryptographic hardware a...
In today’s society, people are more aware of the need for encryption to keep their private informati...
Security is more important than ever, and since we are storing much of our sensitive data on hard dr...
Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as th...
Many systems contain sensitive data such as user credentials used for authentication purposes. For l...
Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when out...
Kryptering används för en mängd olika ändamål idag, till exempel för att elektroniskt signera dokume...
In contemporary encryption the vast amount of text subject to cracking has brought about the demand ...
Att skydda sin information mot offline-attacker och stöld kan vara önskvärt, därför kan man använda ...
Background: A recent study shows that key management in the cooperate world is very painful due to, ...
This thesis compares the impact on disk performance in a GNU/Linux environmentwith three encryption...
When the use of encryption amongst the regular computer user grows morewidespread than ever it makes...
Kryptering har funnits under en lång tid och används i dagslaget till att göra information ej läsbar...
Computer usage is increasing constantly every year and reports of companies that have been targeted ...
Today, it appears that information leaks and security breaches are common occurrences. The authors o...
The goal of this work was to implement a new security protocol by utilising cryptographic hardware a...
In today’s society, people are more aware of the need for encryption to keep their private informati...
Security is more important than ever, and since we are storing much of our sensitive data on hard dr...
Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as th...
Many systems contain sensitive data such as user credentials used for authentication purposes. For l...