Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
92 views
1 page
SC Magazine Evaluating VME2000
SC Magazine evaluating VME2000 encryption software
Uploaded by
Meganet Corporation
AI-enhanced title
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF, TXT or read online on Scribd
Download
Save
Save SC Magazine evaluating VME2000 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
92 views
1 page
SC Magazine Evaluating VME2000
SC Magazine evaluating VME2000 encryption software
Uploaded by
Meganet Corporation
AI-enhanced title
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF, TXT or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save SC Magazine evaluating VME2000 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 1
Search
Fullscreen
REPRINTED FROM SC MAGAZINE SEPTEMBER 2001
nated for automatic (‘on-the-fly’) treatment. In
VME 2000 such folders all files will be kept encrypted. When
any of these files is used (for example loaded into
Word, or printed) it is decrypted for that purpose.
Files copied into such folders are automatically
encrypted in the process, and files within the fold-
ers are automatically decrypted as they are cop-
ied to elsewhere.
CipherFile is a component of VME2000 that
encrypts (via VME or other user selected engines)
selected files or whole folders (directories). A pass-
word is required that must be identical for en-
cryption and decryption. Passwords are stored
by Wilf Hey
(themselves encrypted) and maintained in a
‘keybook,’ and a Manager routine is supplied to
Supplier: Meganet Corporation add, delete or change entries in the keybook.
Price: from US$100 CipherFile also allows users to create self-decrypt-
VME2000 is a suite designed to secure data (pri- Contact: (800) 634-2638, (818) 990-9292 ing files that may be sent to others who do not
marily at desktop level), featuring a technology
[email protected]
have VME2000.
that Meganet calls virtual matrix encryption www.meganet.com CipherText is a wonderfully simple routine
(VME). Meganet has in the past few years set chal- that enables the secure encryption of parts of a
lenges to all who would seek to break VME and FOR Seamless incorporation of encryption ser vices into document. The user can move the mouse to
interpret a hidden message. To date VME has re- Windows makes this product’s operation ver y easy in the specify the limits of encryption, and then a
mained secure in the face of the hackers. few places where it is not automatic. simple ‘CTRL-CC’ will take the selected text and
The product sits typically on a desktop PC as AGAINST It is impossible to retrieve a forgotten key, encrypt it with a prearranged key. Note that if
even under dire emergencies. Laws may conceivably this document is exported to another person
modules running on a Windows platform – Win-
be framed in some countries that prevent such a
dows 95 (second), Windows 98, NT, ME and 2000 or machine, or sent as email, the recipient will
product being used.
are all capable of supporting VME2000. Through need to know the password originally used to
VERDICT An excellent incorporation of top-notch security
encryption services this suite protects data at an encrypt those portions of the data. A small ex-
through encryption into the desktop.
individual station from unintentional disclosure ecutable file is supplied that may be distributed
to others through theft or hacking. It is aimed to Features ★★★★★ freely to any recipients of email in which
provide local physical security just as encryption Ease of Use ★★★★✩ VME2000 encryption is deployed. This will per-
on the ‘Net provides security during transmission. Performance ★★★★★ mit the recipient of a partially-encrypted docu-
It is entirely apart from any other security mea- Documentation ★★★★★ ment to deal with the email, but only when the
sures such as firewalls, and can be made to all in- Support ★★★★✩ same password is used. It should be noted that
tents seamless with normal local operation. Value for Money ★★★★★ CipherText is aware of . RTF (rich text format),
VME centers on a symmetric encryption al- Overall Rating ★★★★★ and will encrypt only the actual text within
gorithm with ten keys. Its central key is a full mil- the .RTF document, leaving the control se-
lion bits long, and expert testimonials proclaim use can be restricted to authorized users who sup- quences unaltered. The net effect is that be-
that to break the code would be daunting indeed. ply their token. Alternatively a user ID and pass- fore decryption, displaying the .RTF will dem-
In fact the innovative method employed encrypts word may be submitted when access is challenged. onstrate its format (including color and font)
not the data being subjected to the algorithm but IDs and relevant passwords (securely encrypted) correctly. (There is a problem with tables in
pointers to portions of the data. Even if all the are stored in a database, for which an editor is encrypted . RTF files: it is advisable to encrypt
keys are compromised, the data is still unavail- supplied. Thus the administrator can quickly the whole of a table rather than one or more
able in clear text. The principal key (the one as modify access rights related to each user. entries within the table.)
long as one million bits) is not held alongside the Alongside this main function, temporary files VME2000 is direct to install, makes eco-
encrypted document, but re-created when de- and other components are ‘shredded’ to safeguard nomic use of disk space, and will be up and
cryption is desired. the system against aggressive hacking or sniffing. running on a station readily. It makes intelli-
A virtual matrix, infinite in extent, is the re- For controlled corporate environments’ token- gent use of Windows features, and optional
source by which encryption is performed. All pos- related passwords (though not for VME itself) encryption components may be activated sim-
sible characters are in the matrix, each in an infi- there is a token/key recovery mechanism. With ply by clicking on a distinctive symbol in the
nite number of positions. A character is encrypted CipherLock in force, users need not fear that their Windows tray. On-demand encryption or file-
first by finding any one of its infinite instances computer may be used to compromise data secu- shredding may also be activated by clicking on
within the matrix, and substituting this ‘pointer’ rity; when they leave the machine, any subsequent the file or folder.
for the character within encrypted text. Even with user is challenged anew. Folders may be nomi- The encryption algorithm is, by all accounts,
the same matrix and all the same keys, identical unparal leled in power. The integrat ion of
characters may be substituted with different point- Contact information: VME2000 into the Windows environment is
ers. VME2000 employs other standard engines thorough and well planned. T he
such as 40-bit, DES and triple-DES. documentation supplied (a little wire-bound
VME2000 consists of several independent manual) is peerless. The installation process is
modules. CipherLock (now available on Windows easy, quick and painless. However, it must be
NT or 2000) offers strong access control and trans- noted that this sort of e ncr yption s uite,
parent immediate encryption. Users of a system Meganet Corporation consisting of many parts and affecting many
16133 Ventura Blvd., Suite 640 quite distinct operations, requires the intelligent
may be equipped with tokens (typically USB to-
Encino, CA 91436
kens, or smartcards) that combine user identifi- attention of users. A training regime for all users
(818)-990-9292
cation with a secure password (encrypted within is a must – but the rewards in terms of added
Fax: (818)-990-2906
the system). Programs, database access or resource security are great.
© Copyright West Coast Publishing 2001
You might also like
ExploringIBMDB2 EncryptionTechnology Marcin BasterIBM POLSKA
PDF
No ratings yet
ExploringIBMDB2 EncryptionTechnology Marcin BasterIBM POLSKA
84 pages
Compliors Sample IT Policy For PCI DSS 1 PDF
PDF
No ratings yet
Compliors Sample IT Policy For PCI DSS 1 PDF
87 pages
VME Office 2008 Productivity Suite
PDF
No ratings yet
VME Office 2008 Productivity Suite
1 page
OSF
PDF
No ratings yet
OSF
70 pages
WP Encryption En-Lesson 6
PDF
No ratings yet
WP Encryption En-Lesson 6
7 pages
En Crypt Ing Technologies For The Forensic Investigator
PDF
No ratings yet
En Crypt Ing Technologies For The Forensic Investigator
37 pages
Network Security Y
PDF
No ratings yet
Network Security Y
65 pages
Confidential Data Storage and Deletion
PDF
No ratings yet
Confidential Data Storage and Deletion
22 pages
Encryption/Decryption Application
PDF
No ratings yet
Encryption/Decryption Application
5 pages
Three Types of Encryption
PDF
100% (3)
Three Types of Encryption
18 pages
Original Project
PDF
No ratings yet
Original Project
65 pages
Guardium Data Encryption - Tech TalkFINAL
PDF
No ratings yet
Guardium Data Encryption - Tech TalkFINAL
27 pages
CSE Instructor Materials Chapter41
PDF
No ratings yet
CSE Instructor Materials Chapter41
27 pages
Instructor Materials Chapter 4: The Art of Protecting Secrets
PDF
No ratings yet
Instructor Materials Chapter 4: The Art of Protecting Secrets
29 pages
Cryptography: Software Section
PDF
No ratings yet
Cryptography: Software Section
5 pages
Network Security Essentials
PDF
No ratings yet
Network Security Essentials
46 pages
(Slides) Authenticated Encryption GCM - CCM
PDF
100% (1)
(Slides) Authenticated Encryption GCM - CCM
48 pages
Software Knowledge
From Everand
Software Knowledge
Debojit Acharjee
No ratings yet
CNS Unit 2
PDF
No ratings yet
CNS Unit 2
32 pages
Doctor Who Security and Encryption FAQ - Revision 22.3
PDF
100% (8)
Doctor Who Security and Encryption FAQ - Revision 22.3
36 pages
15 Oct Symmetric-Key-Encryption-Algorithms
PDF
No ratings yet
15 Oct Symmetric-Key-Encryption-Algorithms
64 pages
Encryption
PDF
No ratings yet
Encryption
3 pages
Data and Computer Communications
PDF
No ratings yet
Data and Computer Communications
61 pages
Network Security Basic Definitions
PDF
No ratings yet
Network Security Basic Definitions
2 pages
Safebyte - Keeping Every Byte of Data Safe and Encry
PDF
No ratings yet
Safebyte - Keeping Every Byte of Data Safe and Encry
10 pages
h11561 Data Domain Encryption WP
PDF
No ratings yet
h11561 Data Domain Encryption WP
15 pages
White Paper: AES Encryption
PDF
No ratings yet
White Paper: AES Encryption
5 pages
AES Introduction PDF
PDF
No ratings yet
AES Introduction PDF
5 pages
White Paper: AES Encryption
PDF
No ratings yet
White Paper: AES Encryption
5 pages
Cryptography: CISSP Guide To Security Essentials
PDF
No ratings yet
Cryptography: CISSP Guide To Security Essentials
51 pages
Seminar On Information Tecnology Acts: Data Encryption Standard (Des)
PDF
No ratings yet
Seminar On Information Tecnology Acts: Data Encryption Standard (Des)
13 pages
CNS Lab Manual
PDF
No ratings yet
CNS Lab Manual
60 pages
Chapter 4
PDF
No ratings yet
Chapter 4
33 pages
The DES Algorithm Illustrated
PDF
No ratings yet
The DES Algorithm Illustrated
70 pages
VME BioDrive - Biometric Flash Storage Device
PDF
No ratings yet
VME BioDrive - Biometric Flash Storage Device
1 page
WINSEM2023-24 BCSE309L TH VL2023240500759 2024-01-19 Reference-Material-I
PDF
No ratings yet
WINSEM2023-24 BCSE309L TH VL2023240500759 2024-01-19 Reference-Material-I
72 pages
Bitlocker To Go
PDF
No ratings yet
Bitlocker To Go
41 pages
Di 09
PDF
No ratings yet
Di 09
15 pages
Data and Computer Communications: - Network Security
PDF
No ratings yet
Data and Computer Communications: - Network Security
61 pages
Ch08 Cryptography
PDF
No ratings yet
Ch08 Cryptography
151 pages
KM Security White Paper
PDF
No ratings yet
KM Security White Paper
32 pages
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
PDF
No ratings yet
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
65 pages
Defeating Bit Locker Encryption With Keys From RAM
PDF
No ratings yet
Defeating Bit Locker Encryption With Keys From RAM
44 pages
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
PDF
No ratings yet
E-Commerce: Security Challenges and Solutions: Dr. Khalid Al-Tawil
65 pages
Unit 2 Data Encryption & Compression
PDF
No ratings yet
Unit 2 Data Encryption & Compression
12 pages
Wepik Securing Data A Comprehensive Overview of Encryption Algorithms Including Des Rsa and Aes 20231006022247RepZ
PDF
No ratings yet
Wepik Securing Data A Comprehensive Overview of Encryption Algorithms Including Des Rsa and Aes 20231006022247RepZ
12 pages
Alex Lecture 6
PDF
No ratings yet
Alex Lecture 6
36 pages
Vms-The Series Continues: FEBRUARY, 1986
PDF
No ratings yet
Vms-The Series Continues: FEBRUARY, 1986
8 pages
A Survey of Encryption Standards
PDF
No ratings yet
A Survey of Encryption Standards
8 pages
Implementation of AES As A Custom Hardware Using NIOS II Processor
PDF
No ratings yet
Implementation of AES As A Custom Hardware Using NIOS II Processor
9 pages
IDEA (Research1)
PDF
No ratings yet
IDEA (Research1)
2 pages
Network Security 1
PDF
No ratings yet
Network Security 1
42 pages
Covering Your Tracks Ncrypt and Ncovert
PDF
No ratings yet
Covering Your Tracks Ncrypt and Ncovert
16 pages
Manage Your Passwords
PDF
No ratings yet
Manage Your Passwords
2 pages
3.2 AES and Multiple DES
PDF
No ratings yet
3.2 AES and Multiple DES
29 pages
Cryptosoft: Divya G.R. Gigi P.S. Sethuparvathi C
PDF
No ratings yet
Cryptosoft: Divya G.R. Gigi P.S. Sethuparvathi C
35 pages
Encryption: Software
PDF
No ratings yet
Encryption: Software
15 pages
Updated Header and Footer Template
PDF
No ratings yet
Updated Header and Footer Template
3 pages
Study Guide Cisco 300-730 SVPN Implementing Secure Solutions with Virtual Private Networks
From Everand
Study Guide Cisco 300-730 SVPN Implementing Secure Solutions with Virtual Private Networks
Anand Vemula
No ratings yet
Docker, Containers And All The Rest: First Edition, #1
From Everand
Docker, Containers And All The Rest: First Edition, #1
Ami Adi
No ratings yet
Fortress Linux: Mastering Firewalls and Network Security
From Everand
Fortress Linux: Mastering Firewalls and Network Security
Dargslan
No ratings yet
Vme Spy Phone XD - Track and Listen
PDF
No ratings yet
Vme Spy Phone XD - Track and Listen
14 pages
VME Cell - Encrypted Cell Phones
PDF
No ratings yet
VME Cell - Encrypted Cell Phones
1 page
VME Terminator H1 - World's Most Powerful Bomb Jammer
PDF
No ratings yet
VME Terminator H1 - World's Most Powerful Bomb Jammer
2 pages
Meganet VME-ManPack Jammer
PDF
No ratings yet
Meganet VME-ManPack Jammer
15 pages
Meganet Department of Defense & Government
PDF
No ratings yet
Meganet Department of Defense & Government
1 page
Internet Crime
PDF
No ratings yet
Internet Crime
26 pages
1.0 Computer Network Security Deployment Requirements
PDF
No ratings yet
1.0 Computer Network Security Deployment Requirements
12 pages
Superna Ransomware Defender
PDF
No ratings yet
Superna Ransomware Defender
4 pages
Lab 3 - Vulnerability Scanning and Exploitation Instructions - Mar 4
PDF
No ratings yet
Lab 3 - Vulnerability Scanning and Exploitation Instructions - Mar 4
5 pages
Certified Ethical Hacker Certified Ethical Hacker: 10 (Practical)
PDF
No ratings yet
Certified Ethical Hacker Certified Ethical Hacker: 10 (Practical)
12 pages
Practical OSINT-riddles
PDF
No ratings yet
Practical OSINT-riddles
7 pages
Sharing and Visibility Designer - Quick Notes (By 0to1code - Com)
PDF
No ratings yet
Sharing and Visibility Designer - Quick Notes (By 0to1code - Com)
14 pages
Present Cipher: Saurav Kumar 11740910
PDF
No ratings yet
Present Cipher: Saurav Kumar 11740910
11 pages
Stuxnet .Duqu .Falme ..?: Santosh Khadsare
PDF
No ratings yet
Stuxnet .Duqu .Falme ..?: Santosh Khadsare
27 pages
Security Awareness Training
PDF
No ratings yet
Security Awareness Training
25 pages
Penetration Test Report VC
PDF
No ratings yet
Penetration Test Report VC
11 pages
Chapter 16 (Computer)
PDF
No ratings yet
Chapter 16 (Computer)
3 pages
Ethical Hacking Real Evaluation Model of Brute For
PDF
No ratings yet
Ethical Hacking Real Evaluation Model of Brute For
7 pages
Case Study Sunny Lake Hosp
PDF
No ratings yet
Case Study Sunny Lake Hosp
12 pages
Fighting Fake Antivirus Software: What Is An Antivirus?
PDF
No ratings yet
Fighting Fake Antivirus Software: What Is An Antivirus?
1 page
Detecting Windows Attacks With Splunk
PDF
No ratings yet
Detecting Windows Attacks With Splunk
93 pages
Siwes Report of Saidu Sanusi Saidu
PDF
No ratings yet
Siwes Report of Saidu Sanusi Saidu
25 pages
The Memory Palace - A Quick Refresher For Your CISSP Exam
PDF
No ratings yet
The Memory Palace - A Quick Refresher For Your CISSP Exam
127 pages
RTGS Vs NEFT
PDF
No ratings yet
RTGS Vs NEFT
17 pages
SSL in Weblogic 12C
PDF
No ratings yet
SSL in Weblogic 12C
4 pages
Salesforce 2FA FAQ
PDF
No ratings yet
Salesforce 2FA FAQ
5 pages
Assignment On Computer Viruses - Odt
PDF
No ratings yet
Assignment On Computer Viruses - Odt
5 pages
Quiz 9 Secure Sockets Layer TLS PDF
PDF
No ratings yet
Quiz 9 Secure Sockets Layer TLS PDF
3 pages
Test Case Template: Super Admin, Admin, Owner, Renter, Employee
PDF
No ratings yet
Test Case Template: Super Admin, Admin, Owner, Renter, Employee
8 pages
Objection
PDF
No ratings yet
Objection
20 pages
NIS Microproject 01
PDF
No ratings yet
NIS Microproject 01
17 pages
Assessment 2 Cyber Security by Bigyan
PDF
No ratings yet
Assessment 2 Cyber Security by Bigyan
15 pages
Weekly Problems
PDF
No ratings yet
Weekly Problems
12 pages
ISC2 CC Dump Questions - MD
PDF
No ratings yet
ISC2 CC Dump Questions - MD
35 pages
Red Hat Enterprise Linux 8 Securing Networks en US
PDF
No ratings yet
Red Hat Enterprise Linux 8 Securing Networks en US
67 pages