Posts Tagged ‘certificate’

What is a digital ID in an email message?

You use digital IDs to prove your identity and encrypt text when sending email messages. This permits your recipients to determine that the message was actually sent by you and keeps your conversation private.

Read more…


Be the first to comment - What do you think?  Posted by George - June 6, 2013 at 4:02 am

Categories: Security   Tags: , , ,

IE Certificate Error Messages

Internet Explorer provides a warning when you navigate to a secure website and detects a problem with the SSL certificate. SSL certificates provide a way to verify the identity of a website to which you are connecting and ensure that communication between your browser and the website is secured through encryption.

Read more…

Be the first to comment - What do you think?  Posted by George - February 28, 2012 at 3:18 am

Categories: Security   Tags: , , , , , , ,

Using Smart Cards with Windows 7

In highly secure environments where Smart Cards are the preferred method for authentication, Windows 7 is the system that allows you to use Smart Cards without requiring any specific vendor software. In addition, Windows 7 allows you to fine tune the authentication mechanism through the use of policies. Why Smart Cards? Smart Cards are more secure than other means of authentication such as user names and passwords. They store digital certificates where an administrator can immediately revoke the certificate stored on a lost or stolen Smart Card from the system.

Read more…

Be the first to comment - What do you think?  Posted by George - October 2, 2011 at 5:27 am

Categories: Devices, Security   Tags: , , , , , , , , ,

Software Restriction Policies

In most organizations the majority number of employees runs the same applications and it is quite normal to find a list of approved applications. Apart, from disallowing standard users (non administrator privileges) to install any unapproved applications some IT policies dictate that some applications although required to be present on the computer for administration purposes, standard users are not allowed to execute them. For example, you may want to block admin scripts and specific DLLs from running. You can achieve this with help of Group Policies – Software Restriction Policies.

Read more…

7 comments - What do you think?  Posted by George - November 20, 2010 at 2:56 am

Categories: Security   Tags: , , , , , , , ,