Unlocking encryption and digital signatures
Article Abstract:
The rise in legal document exchange over networks has prompted the need for law firms to invest in better data security for file transfer and receipt. Public key encryption technology and digital signatures are becoming popular for this purpose and is in use by many firms that prefer not to have the government impose and control a data security standard. RSA Data Security's Pretty Good Privacy (PGP) encryption package is gaining ground as a product suited for implementing data encryption in the office. PGP can be downloaded for free from the Internet or purchased in a commercial version with technical support and regular updates. PGP users post a public key on the public key server on the Internet. This key is used by any other user wishing to send a message to the first user. The user also creates a private key for deciphering messages encoded with the public key and stores the personal encryption code in a safe place off the network. Digital signature technology is also being explored as a means of verifying digital documents, such as contracts, transmitted via e-mail.
Publication Name: Law Office Computing
Subject: Law
ISSN: 1055-128X
Year: 1995
User Contributions:
Comment about this article or add new information about this topic:
Fighting back against junk e-mail
Article Abstract:
Tips for combatting increasing amounts of junk e-mail are presented. The practice of sending an abundance of inappropriate e-mail, often referred to as spamming, originated in Internet discussion forums such as newsgroups and mailing lists. Currently, however, it has permeated most e-mail boxes. While ongoing junk e-mail cases are litigated users can take action to manage this menacing problem. First, users can request that their name be removed from all mailing lists that have sent them spam. They can also apply their e-mail's filter option to automatically delete unwanted mail. Users can remove their names from all direct marketing e-mail lists and they can delete their addresses from posted messages to avoid letting spammers obtain their address in the first place. They can have their addresses deleted from Internet directory producers and they can ensure that their e-mail addresses remain private on public e-mail mailing lists.
Publication Name: Law Office Computing
Subject: Law
ISSN: 1055-128X
Year: 1997
User Contributions:
Comment about this article or add new information about this topic:
Presenting the Internet
Article Abstract:
Web browsers, such as Netscape's Navigator, can be used for presentations. This is accomplished most effectively by downloading appropriate Web pages and creating a presentation that interconnects the pages. Text and graphics can be added, as well as elements such as color fonts or bullets. This amounts to building a Web site. The advantage is that presentations are provided in a convenient clickable format, with hyperlinks for accessing content in a manner that is flexible and intuitive. For those uncertain about how to proceed, a free online HTML tutorial is recommended, posted by Case Western Reserve University (www.cwru.edu/help/introHTML/).
Publication Name: Law Office Computing
Subject: Law
ISSN: 1055-128X
Year: 1997
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Primitive origins on the net. Meet via the Internet
- Abstracts: Who's in charge? No easy answers in representing the mentally incompetent client. Workers' comp practices shrink; in some states, reform means fewer cases for attorneys
- Abstracts: Access in telecommunications: a little less equality, a little more entry. Telecompetition revisited: an agenda
- Abstracts: Shopper's guide to case management software. Presentation software for idiots. Accounting software for solos