Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Security  PGP (Pretty Good Privacy)

Posted on 2011-02-11
2
Medium Priority
?
591 Views
Last Modified: 2012-05-11
Explain how PGP uses both asymmetric and symmetric encryption to be both secure and efficient
0
Comment
Question by:melmaxi64
2 Comments
 
LVL 6

Expert Comment

by:Ferrosti
ID: 34869886
What is this?
Do we have to do your homework?
0
 
LVL 5

Accepted Solution

by:
rysic earned 2000 total points
ID: 34869933
0

Featured Post

[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month11 days, 11 hours left to enroll

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question