MUO

Encryption

Page 3

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
text encryption with a security lock 1
Vim
How to Use Vim to Encrypt Text Files on Linux

It's easy to secure the contents of a text file on Linux by encrypting it with Vim.

By 
Apple Store in the United States 1
Why the FBI Isn't Happy About Apple's iCloud Encryption

End-to-end encryption for Apple's iCloud service is a win for its loyal users but not so much for the FBI. Let's discuss all about it.

By 
An illustration of Tutanota vs ProtonMail 1
ProtonMail vs. Tutanota: Which Encrypted Email Service Is Best?

We compare Tutanota and ProtonMail, accounting for security and privacy features, spam filters, ease of use, and more.

By 
Green symbols falling on a display Matrix-style 1
What Is Lattice-Based Cryptography and Why Is It Important?

Quantum computing has the power to break regular cryptography algorithms. Here's why lattice-based cryptography will protect us in the future.

By 
VeraCrypt logo on picture of chained fence 1
How to Use VeraCrypt’s Advanced Features to Secure Important Files

Are you encrypting your data using VeraCrypt? Here are some advanced settings to help you protect your sensitive files.

By 
rifling through ream of paper 1
How to Back Up and Print Your GnuPG Key to Paper

You don't have to store a backup digitally. Using paper might even be safer. Here's how to back up your GnuPG key the old-fashioned way!

By 
padlock on laptop keyboard 1
How to Generate Your Own GnuPG Key

By creating your own GnuPG key, you can encrypt your important files and correspondence. And it's not as difficult as it sounds. Here's what to do.

By 
VeraCrypt and Microsoft Windows logos on a picture of a lock and chains 1
How to Encrypt a Windows System Drive With VeraCrypt

Here's how to keep your Windows drive or partition secure using encryption courtesy of VeraCrypt.

By 
man scratching head in front of security emails feature 1
7 Common Email Security Protocols Explained

How do ISPs and webmail services protect email users? Here's how email security protocols keep your messages safe.

By 
Brave, Signal, Avira, Windscribe, Protonmail logos seen on purple background 1
5 Free Privacy Tools You Can Use on Any Device

Here are some free tools you can download to your PC, laptop, and smartphone to keep your data private. And they sync between devices too!

By 
Padlock graphic illustration seen on dark blue background  1
What Is the Best Encryption Software?

Looking to render your files unreadable to hackers and other intruders? Here are the best services that encrypt your data.

By 
 1
How to Enable Video End-to-End Encryption on Your Ring Devices

We'll show you how to enable the important security feature.

By 
wifi router with padlock on cables feature 1
WEP vs. WPA vs. WPA2 vs. WPA3: Wi-Fi Security Types Explained

There are many types of wireless security but which should you be using? Which Wi-Fi is most secure: WEP, WPA, WPA2, or WPA3?

By 
connecting to a virtual private network 1
Should You Always Leave Your VPN Turned On?

VPNs have their positives and negatives, so should you stay connected? In what circumstances should you turn your VPN off?

By 
Blurred screen of computer code 1
What Is Zero-Knowledge Encryption and Why Should You Use It?

Standard encryption isn't always good enough to secure your private data. That's where zero-knowledge encryption comes in...

By 
protecting files using encryption 1
How to Encrypt and Protect Your Data and Files Using VeraCrypt

Protecting your valuable personal data can be easy using VeraCrypt, a free and open-source encryption tool.

By 
access home assistant server remotely with duckdns and let's encrypt 1
Access Your Home Assistant Server Remotely With DuckDNS and Let’s Encrypt

Access your smart home securely via the internet without paying a subscription fee.

By 
Graphic illustration shows a padlock on a digital circuit board 1
What Is the XChaCha20 Encryption Algorithm?

The Advanced Encryption Standard (AES) might be a thing of the past. So what exactly is XChaCha20 encryption, the new kid on the block?

By 
Woman Typing on Laptop 1
10 Best Practices to Implement Zero Trust Security

Looking for a belt-and-braces approach to securing your network? Zero trust security could be the key. Here's how to approach it.

By 
close up shot of quantum computer 1
What Is Quantum Computing, Is It Real, and How Does It Change Things?

How will quantum computing change our relationship with computers?

By 
1 2 3 4 5
Page 3 / 17