Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
94 views
1 page
SC Magazine Evaluating VME2000
SC Magazine evaluating VME2000 encryption software
Uploaded by
Meganet Corporation
AI-enhanced title
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF, TXT or read online on Scribd
Download
Save
Save SC Magazine evaluating VME2000 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
94 views
1 page
SC Magazine Evaluating VME2000
SC Magazine evaluating VME2000 encryption software
Uploaded by
Meganet Corporation
AI-enhanced title
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF, TXT or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save SC Magazine evaluating VME2000 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save SC Magazine evaluating VME2000 For Later
You are on page 1
/ 1
Search
Fullscreen
REPRINTED FROM SC MAGAZINE SEPTEMBER 2001
nated for automatic (‘on-the-fly’) treatment. In
VME 2000 such folders all files will be kept encrypted. When
any of these files is used (for example loaded into
Word, or printed) it is decrypted for that purpose.
Files copied into such folders are automatically
encrypted in the process, and files within the fold-
ers are automatically decrypted as they are cop-
ied to elsewhere.
CipherFile is a component of VME2000 that
encrypts (via VME or other user selected engines)
selected files or whole folders (directories). A pass-
word is required that must be identical for en-
cryption and decryption. Passwords are stored
by Wilf Hey
(themselves encrypted) and maintained in a
‘keybook,’ and a Manager routine is supplied to
Supplier: Meganet Corporation add, delete or change entries in the keybook.
Price: from US$100 CipherFile also allows users to create self-decrypt-
VME2000 is a suite designed to secure data (pri- Contact: (800) 634-2638, (818) 990-9292 ing files that may be sent to others who do not
marily at desktop level), featuring a technology
[email protected]
have VME2000.
that Meganet calls virtual matrix encryption www.meganet.com CipherText is a wonderfully simple routine
(VME). Meganet has in the past few years set chal- that enables the secure encryption of parts of a
lenges to all who would seek to break VME and FOR Seamless incorporation of encryption ser vices into document. The user can move the mouse to
interpret a hidden message. To date VME has re- Windows makes this product’s operation ver y easy in the specify the limits of encryption, and then a
mained secure in the face of the hackers. few places where it is not automatic. simple ‘CTRL-CC’ will take the selected text and
The product sits typically on a desktop PC as AGAINST It is impossible to retrieve a forgotten key, encrypt it with a prearranged key. Note that if
even under dire emergencies. Laws may conceivably this document is exported to another person
modules running on a Windows platform – Win-
be framed in some countries that prevent such a
dows 95 (second), Windows 98, NT, ME and 2000 or machine, or sent as email, the recipient will
product being used.
are all capable of supporting VME2000. Through need to know the password originally used to
VERDICT An excellent incorporation of top-notch security
encryption services this suite protects data at an encrypt those portions of the data. A small ex-
through encryption into the desktop.
individual station from unintentional disclosure ecutable file is supplied that may be distributed
to others through theft or hacking. It is aimed to Features ★★★★★ freely to any recipients of email in which
provide local physical security just as encryption Ease of Use ★★★★✩ VME2000 encryption is deployed. This will per-
on the ‘Net provides security during transmission. Performance ★★★★★ mit the recipient of a partially-encrypted docu-
It is entirely apart from any other security mea- Documentation ★★★★★ ment to deal with the email, but only when the
sures such as firewalls, and can be made to all in- Support ★★★★✩ same password is used. It should be noted that
tents seamless with normal local operation. Value for Money ★★★★★ CipherText is aware of . RTF (rich text format),
VME centers on a symmetric encryption al- Overall Rating ★★★★★ and will encrypt only the actual text within
gorithm with ten keys. Its central key is a full mil- the .RTF document, leaving the control se-
lion bits long, and expert testimonials proclaim use can be restricted to authorized users who sup- quences unaltered. The net effect is that be-
that to break the code would be daunting indeed. ply their token. Alternatively a user ID and pass- fore decryption, displaying the .RTF will dem-
In fact the innovative method employed encrypts word may be submitted when access is challenged. onstrate its format (including color and font)
not the data being subjected to the algorithm but IDs and relevant passwords (securely encrypted) correctly. (There is a problem with tables in
pointers to portions of the data. Even if all the are stored in a database, for which an editor is encrypted . RTF files: it is advisable to encrypt
keys are compromised, the data is still unavail- supplied. Thus the administrator can quickly the whole of a table rather than one or more
able in clear text. The principal key (the one as modify access rights related to each user. entries within the table.)
long as one million bits) is not held alongside the Alongside this main function, temporary files VME2000 is direct to install, makes eco-
encrypted document, but re-created when de- and other components are ‘shredded’ to safeguard nomic use of disk space, and will be up and
cryption is desired. the system against aggressive hacking or sniffing. running on a station readily. It makes intelli-
A virtual matrix, infinite in extent, is the re- For controlled corporate environments’ token- gent use of Windows features, and optional
source by which encryption is performed. All pos- related passwords (though not for VME itself) encryption components may be activated sim-
sible characters are in the matrix, each in an infi- there is a token/key recovery mechanism. With ply by clicking on a distinctive symbol in the
nite number of positions. A character is encrypted CipherLock in force, users need not fear that their Windows tray. On-demand encryption or file-
first by finding any one of its infinite instances computer may be used to compromise data secu- shredding may also be activated by clicking on
within the matrix, and substituting this ‘pointer’ rity; when they leave the machine, any subsequent the file or folder.
for the character within encrypted text. Even with user is challenged anew. Folders may be nomi- The encryption algorithm is, by all accounts,
the same matrix and all the same keys, identical unparal leled in power. The integrat ion of
characters may be substituted with different point- Contact information: VME2000 into the Windows environment is
ers. VME2000 employs other standard engines thorough and well planned. T he
such as 40-bit, DES and triple-DES. documentation supplied (a little wire-bound
VME2000 consists of several independent manual) is peerless. The installation process is
modules. CipherLock (now available on Windows easy, quick and painless. However, it must be
NT or 2000) offers strong access control and trans- noted that this sort of e ncr yption s uite,
parent immediate encryption. Users of a system Meganet Corporation consisting of many parts and affecting many
16133 Ventura Blvd., Suite 640 quite distinct operations, requires the intelligent
may be equipped with tokens (typically USB to-
Encino, CA 91436
kens, or smartcards) that combine user identifi- attention of users. A training regime for all users
(818)-990-9292
cation with a secure password (encrypted within is a must – but the rewards in terms of added
Fax: (818)-990-2906
the system). Programs, database access or resource security are great.
© Copyright West Coast Publishing 2001
You might also like
ExploringIBMDB2 EncryptionTechnology Marcin BasterIBM POLSKA
PDF
No ratings yet
ExploringIBMDB2 EncryptionTechnology Marcin BasterIBM POLSKA
84 pages
VME Office 2008 Productivity Suite
PDF
No ratings yet
VME Office 2008 Productivity Suite
1 page
OSF
PDF
No ratings yet
OSF
70 pages
WP Encryption En-Lesson 6
PDF
No ratings yet
WP Encryption En-Lesson 6
7 pages
En Crypt Ing Technologies For The Forensic Investigator
PDF
No ratings yet
En Crypt Ing Technologies For The Forensic Investigator
37 pages
Network Security Y
PDF
No ratings yet
Network Security Y
65 pages
Confidential Data Storage and Deletion
PDF
No ratings yet
Confidential Data Storage and Deletion
22 pages
Encryption/Decryption Application
PDF
No ratings yet
Encryption/Decryption Application
5 pages
Three Types of Encryption
PDF
100% (3)
Three Types of Encryption
18 pages
Original Project
PDF
No ratings yet
Original Project
65 pages
Guardium Data Encryption - Tech TalkFINAL
PDF
No ratings yet
Guardium Data Encryption - Tech TalkFINAL
27 pages
CSE Instructor Materials Chapter41
PDF
No ratings yet
CSE Instructor Materials Chapter41
27 pages
Instructor Materials Chapter 4: The Art of Protecting Secrets
PDF
No ratings yet
Instructor Materials Chapter 4: The Art of Protecting Secrets
29 pages
Cryptography: Software Section
PDF
No ratings yet
Cryptography: Software Section
5 pages
Network Security Essentials
PDF
No ratings yet
Network Security Essentials
46 pages
(Slides) Authenticated Encryption GCM - CCM
PDF
100% (1)
(Slides) Authenticated Encryption GCM - CCM
48 pages
Software Knowledge
From Everand
Software Knowledge
Debojit Acharjee
No ratings yet
CNS Unit 2
PDF
No ratings yet
CNS Unit 2
32 pages
Doctor Who Security and Encryption FAQ - Revision 22.3
PDF
100% (8)
Doctor Who Security and Encryption FAQ - Revision 22.3
36 pages
15 Oct Symmetric-Key-Encryption-Algorithms
PDF
No ratings yet
15 Oct Symmetric-Key-Encryption-Algorithms
64 pages
Encryption
PDF
No ratings yet
Encryption
3 pages
Data and Computer Communications
PDF
No ratings yet
Data and Computer Communications
61 pages
Network Security Basic Definitions
PDF
No ratings yet
Network Security Basic Definitions
2 pages
Safebyte - Keeping Every Byte of Data Safe and Encry
PDF
No ratings yet
Safebyte - Keeping Every Byte of Data Safe and Encry
10 pages
h11561 Data Domain Encryption WP
PDF
No ratings yet
h11561 Data Domain Encryption WP
15 pages
White Paper: AES Encryption
PDF
No ratings yet
White Paper: AES Encryption
5 pages
AES Introduction PDF
PDF
No ratings yet
AES Introduction PDF
5 pages
White Paper: AES Encryption
PDF
No ratings yet
White Paper: AES Encryption
5 pages
Cryptography: CISSP Guide To Security Essentials
PDF
No ratings yet
Cryptography: CISSP Guide To Security Essentials
51 pages
Seminar On Information Tecnology Acts: Data Encryption Standard (Des)
PDF
No ratings yet
Seminar On Information Tecnology Acts: Data Encryption Standard (Des)
13 pages
CNS Lab Manual
PDF
No ratings yet
CNS Lab Manual
60 pages
Chapter 4
PDF
No ratings yet
Chapter 4
33 pages
The DES Algorithm Illustrated
PDF
No ratings yet
The DES Algorithm Illustrated
70 pages
VME BioDrive - Biometric Flash Storage Device
PDF
No ratings yet
VME BioDrive - Biometric Flash Storage Device
1 page
WINSEM2023-24 BCSE309L TH VL2023240500759 2024-01-19 Reference-Material-I
PDF
No ratings yet
WINSEM2023-24 BCSE309L TH VL2023240500759 2024-01-19 Reference-Material-I
72 pages
Bitlocker To Go
PDF
No ratings yet
Bitlocker To Go
41 pages
Di 09
PDF
No ratings yet
Di 09
15 pages
Data and Computer Communications: - Network Security
PDF
No ratings yet
Data and Computer Communications: - Network Security
61 pages
Ch08 Cryptography
PDF
No ratings yet
Ch08 Cryptography
151 pages
KM Security White Paper
PDF
No ratings yet
KM Security White Paper
32 pages
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
PDF
No ratings yet
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
65 pages
Defeating Bit Locker Encryption With Keys From RAM
PDF
No ratings yet
Defeating Bit Locker Encryption With Keys From RAM
44 pages
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
PDF
No ratings yet
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
65 pages
Unit 2 Data Encryption & Compression
PDF
No ratings yet
Unit 2 Data Encryption & Compression
12 pages
Wepik Securing Data A Comprehensive Overview of Encryption Algorithms Including Des Rsa and Aes 20231006022247RepZ
PDF
No ratings yet
Wepik Securing Data A Comprehensive Overview of Encryption Algorithms Including Des Rsa and Aes 20231006022247RepZ
12 pages
Alex Lecture 6
PDF
No ratings yet
Alex Lecture 6
36 pages
Vms-The Series Continues: FEBRUARY, 1986
PDF
No ratings yet
Vms-The Series Continues: FEBRUARY, 1986
8 pages
A Survey of Encryption Standards
PDF
No ratings yet
A Survey of Encryption Standards
8 pages
Implementation of AES As A Custom Hardware Using NIOS II Processor
PDF
No ratings yet
Implementation of AES As A Custom Hardware Using NIOS II Processor
9 pages
IDEA (Research1)
PDF
No ratings yet
IDEA (Research1)
2 pages
Network Security 1
PDF
No ratings yet
Network Security 1
42 pages
Covering Your Tracks Ncrypt and Ncovert
PDF
No ratings yet
Covering Your Tracks Ncrypt and Ncovert
16 pages
Manage Your Passwords
PDF
No ratings yet
Manage Your Passwords
2 pages
3.2 AES and Multiple DES
PDF
No ratings yet
3.2 AES and Multiple DES
29 pages
Cryptosoft: Divya G.R. Gigi P.S. Sethuparvathi C
PDF
No ratings yet
Cryptosoft: Divya G.R. Gigi P.S. Sethuparvathi C
35 pages
Encryption: Software
PDF
No ratings yet
Encryption: Software
15 pages
Updated Header and Footer Template
PDF
No ratings yet
Updated Header and Footer Template
3 pages
Study Guide Cisco 300-730 SVPN Implementing Secure Solutions with Virtual Private Networks
From Everand
Study Guide Cisco 300-730 SVPN Implementing Secure Solutions with Virtual Private Networks
Anand Vemula
No ratings yet
Docker, Containers And All The Rest: First Edition, #1
From Everand
Docker, Containers And All The Rest: First Edition, #1
Ami Adi
No ratings yet
Fortress Linux: Mastering Firewalls and Network Security
From Everand
Fortress Linux: Mastering Firewalls and Network Security
Dargslan
No ratings yet
Vme Spy Phone XD - Track and Listen
PDF
No ratings yet
Vme Spy Phone XD - Track and Listen
14 pages
VME Cell - Encrypted Cell Phones
PDF
No ratings yet
VME Cell - Encrypted Cell Phones
1 page
VME Terminator H1 - World's Most Powerful Bomb Jammer
PDF
No ratings yet
VME Terminator H1 - World's Most Powerful Bomb Jammer
2 pages
Meganet Department of Defense & Government
PDF
No ratings yet
Meganet Department of Defense & Government
1 page
Meganet VME-ManPack Jammer
PDF
No ratings yet
Meganet VME-ManPack Jammer
15 pages
Internet Crime
PDF
No ratings yet
Internet Crime
26 pages
Cics Level 2
PDF
No ratings yet
Cics Level 2
44 pages
E Studio 7.0.0: Release Note
PDF
No ratings yet
E Studio 7.0.0: Release Note
38 pages
Install Jupyterlab Using Conda
PDF
No ratings yet
Install Jupyterlab Using Conda
2 pages
Autocad 2013 Full MEGA and MEDIAFIRE
PDF
No ratings yet
Autocad 2013 Full MEGA and MEDIAFIRE
8 pages
Tyler Hartgrove Resume
PDF
No ratings yet
Tyler Hartgrove Resume
2 pages
Bash Cookbook
PDF
No ratings yet
Bash Cookbook
21 pages
How To Use Tableau
PDF
No ratings yet
How To Use Tableau
6 pages
Embedded Systems Unit IV
PDF
No ratings yet
Embedded Systems Unit IV
11 pages
GMetrix PracticeTests QuickStartGuide
PDF
No ratings yet
GMetrix PracticeTests QuickStartGuide
2 pages
Template Mikrotik Untuk Zabbix
PDF
No ratings yet
Template Mikrotik Untuk Zabbix
21 pages
Adding Omnikey Cardman 3121 USB To Ubuntu or Debian
PDF
No ratings yet
Adding Omnikey Cardman 3121 USB To Ubuntu or Debian
3 pages
Oprating System
PDF
No ratings yet
Oprating System
24 pages
The Complete List of MS-DOS Commands
PDF
No ratings yet
The Complete List of MS-DOS Commands
3 pages
DataLink B0193YJ D
PDF
No ratings yet
DataLink B0193YJ D
166 pages
DC Os 2
PDF
No ratings yet
DC Os 2
3 pages
Citrix Virtual AppsDesktops 7 - 1912 Pre-Sales Workshop Lab Guide
PDF
No ratings yet
Citrix Virtual AppsDesktops 7 - 1912 Pre-Sales Workshop Lab Guide
142 pages
7 - MS Word Mail Merging, Label, & Inserting Image
PDF
No ratings yet
7 - MS Word Mail Merging, Label, & Inserting Image
24 pages
Export Sap2000 To DWG - Sap2000 - Csi
PDF
No ratings yet
Export Sap2000 To DWG - Sap2000 - Csi
7 pages
Syllabus
PDF
No ratings yet
Syllabus
5 pages
Microsoft Office Project 2003, Step-By-Step
PDF
0% (1)
Microsoft Office Project 2003, Step-By-Step
543 pages
Documentation On Kali Linux
PDF
No ratings yet
Documentation On Kali Linux
5 pages
Robocopy Command Syntax and Examples
PDF
No ratings yet
Robocopy Command Syntax and Examples
6 pages
Clarion ASP Annotated Examples
PDF
No ratings yet
Clarion ASP Annotated Examples
188 pages
Evince Vs XPDF
PDF
No ratings yet
Evince Vs XPDF
2 pages
Touchpad and Keyboard: User Guide
PDF
No ratings yet
Touchpad and Keyboard: User Guide
18 pages
Illustrator 1
PDF
No ratings yet
Illustrator 1
27 pages
Creo 7.0 Read This First
PDF
No ratings yet
Creo 7.0 Read This First
9 pages
Bluetooth Version Finder v1.1
PDF
No ratings yet
Bluetooth Version Finder v1.1
4 pages
Subclipse - Install, Use and Compile
PDF
No ratings yet
Subclipse - Install, Use and Compile
7 pages
Mod Menu Crash 2022 10 17-11 50 45
PDF
No ratings yet
Mod Menu Crash 2022 10 17-11 50 45
2 pages