Data encryption software

Hello All,
Does anyone know of a good data encryption software that can encrypt/decrypt the contact information on my Treo 700 w/x (Verizon) running WM6. I am specifically looky to encrypt the contact information on my handheld so if the device is stolen or lost the contact information will not be accessible withouth having to enter a password.  The device is synching with Outlook 2003 using ActiveSynch. 
Regards, 
Rex
Post relates to: Treo 700wx (Verizon)

Jeffro wrote:
Vernon27 wrote:
I am looking for software that will encrypt the data on my handheld.
(Edit: Links don't look like links any more??)
Message Edited by Jeffro on 05-27-2009 06:47 PM
Jeffro, we're aware of this bug, and are hammering Palm/lithium to get it repaired.  Since the skin update, there have been a few others appear...
WyreNut
I am a Volunteer here, not employed by HP.
You too can become an HP Expert! Details HERE!
If my post has helped you, click the Kudos Thumbs up!
If it solved your issue, Click the "Accept as Solution" button so others can benefit from the question you asked!

Similar Messages

  • Need 256 Bit AES Full Disk Encryption for a Mac.  The other discussions regarding this issue are very old.  Does anyone have any current advice regarding encryption software?

    Does anyone have any advice regarding 256 bit full disk encryption software for Macs?  The other discussions on the topic are years old, so I would like some current input.  Thanks for your help in advance.

    Depending on your Mac, you might not want to upgrade to OS X 10.7 or 10.8 as it will not run the PowerPC based software your currently using costing a bundle to replace it all, also they will slow down your machine if it's not a more recent issue. You don't want to upgrade OS X without AppleCare defending your possibly bricked logicboard that's for sure.
    Filevault encrypts the boot drive, however in doing so makes it near impossible to fix if you have a software issue and need to recover files directly or by using specialty software. Also it robs the machine of performance even more than the Lions do. So you will really need a SSD to work best with 10.7/10.8 and Filevault, then it has to be freshly installed. Filevault needs 50% free space on the boot drive, then it's going to write to the slower 50% half of the hard drive where performance is terrible compared to the first 50%.
    Also Filevault is cracked under certain conditions, and if someone gets their hands on the machine (like the law) and knows what they are doing.
    If you take your Filevaulted machine to Apple to fix, they are going to require the password to fix the machine obviously.
    Software based encryption is vulnerable, you might want to instead place your sensitive data on external self-encrypting hardware that doesn't rely upon software or computer hacks/bypasses (ike freezing the RAM) to get to it.
    http://www.datalocker.com/products/datalocker-dl3.html
    Iron Keys for portable USB self encryption, both work with any computer, so your not locked into one platform.
    With the senstive data off the computer and on a external device, there is the option of removing, hiding and securing the device. If used with a computer that's never connected to the Internet, it's safe from snoopers, except from a survelliance van parked outside your door.

  • Call Encryption Software from SAP

    There is an encryption software installed in the user's PC.
    Some files are being downloaded in to the user's PC from SAP using a report.
    Is it possible to call this encryption software in the user's PC to encrypt all the downloaded files from SAP ?

    Hi,
    Yes, there are many ways to call the executable program <br>
    1) Call by OLE <br>
        You can call by OLE technique only if your encryption program provides OLE objects to be exposed for other applications. For example, call Excel or Word OLE objects from ABAP. You can search on SAP for OLE demonstration<br>
    2) Call directly executable program <br>
    You can call executable program in your front end station from your abap source code by using fct. module GUI_RUN . This call works only in foreground since the executable program is in your front end station and you have to know the parameters that your external program can accept (ie. you have to read your encryption manual).If you do not know the parameters to be sent to you encryption program then you coud crate a batch file in Windows and run the batch file from ABAP. <br>
    Example:<br>
    CALL FUNCTION 'GUI_RUN'<br>
      EXPORTING<br>
        COMMAND          = 'NOTEPAD.EXE'<br>
       PARAMETER         = 'c:\TEST.TXT'.<br>
    3) Call by DDE (Data dynamic Exchange)
    This one, I forget how to do this since done about 5 years ago, Return to you later if you really need this technique

  • Premier and Company Encryption Software

    Hi, all.
    I have attached to my work computer an external 320GB hard drive which I use for capturing and storing digital video.  The drive has never been removed and is not intended to be used as portable media.
    My company has recently installed software on all of our computers that requires any data sent to removable media to be encrypted in a way that can only be read by computers with this same software installed.  This is to protect sensitive client information, which is completely reasonable and understandable.  Unfortunately, since this new encryption software was installed, I have been unable to create new folders on this hard drive and Premier will not allow it to be designated as a scratch disc, telling me that I do not have access permissions. I also cannot save any projects opened from this disc back onto it.
    If I unplug the drive and reattach it, I am prompted by the encryption software "wizard" to convert the drive into encrypted format. I am hesitant to do this, since I don't understand how it will affect the files currently on the drive or how the drive's performance will be affected afterward.  I also fear that the encryption process might hinder the ability of my software to read from and write to it on the fly. The issue may be complicated further if the encryption process slows down the transfer rate, but that remains to be seen.
    I have sent a ticket to the IT department to let them know of my concerns, but I wanted to get some input from other Adobe users before I have them do anything irreversible.  Based on your experience, does anyone think Premier and After Effects will go batty if the video data has to be encrypted and unencrypted as it goes to and from the hard disc?  Anyone else working in a secure environment who could share their experience with this kind of thing?  The IT department doesn't know anything about video and I can't rely on them to know how this will affect my rig.  Any insight or advice to share before they come a-knockin'?
    Thanks in advance for any assistance!

    The simple fact that the drive "is" removable, whether you use it that way or not, is going to be problematic.
    I would highly suggest you "social engineer" the following with the IT dep't:
    Have them install an internal media drive (or 4 - see various configuration recommendation threads on this forum) without encryption software. If you are not working with client's excel spreadsheets or word documents, just video that will eventually be distributed in some format anyway, (e.g., it will have a presence outside the network computers even if it is still internal), then you can make a better case for being opted out of the encryption requirement.
    As a compromise, ask them to make the NLE computer's USB ports inactive except for printing. This will help satisfy the security requirements they are trying to implement. Remember, it is probably not their idea to do all this. Whatever you can do to make it difficult or impossible for data to be removed from this computer will increase your chances of making a compelling argument against encryption.
    Make the IT department responsible for creating a backup of all your unencrypted media before anything else - even if they have to uninstall the encryption software, make the backup and then reinstall it. Keep this backup separate and unencrypted until the dust has settled.
    If they absolutely refuse to let you be exempted, find the video "wannabe" in the IT department and involve him in the process of making the NLE software work with the encryption software. Perhaps when he gives up you'll finally be able to do without. Or, maybe, it will be working properly.
    Either way, sit back and wait for the howls of dismay when suddenly some critical files in another department are no longer accessible because of a conflict between the encryption and the some security update. 

  • HP Drive Encryption Software (Winmagic)

    Hi, I'm having a problem with the HP Drive Encryption Software. I had to reinstall my operating system, but I forgot the decrypt my hard drive before the reinstall. My HDD was split into 3 partitions, 1 was for the OS and the other 2 for data storage. Currently, after the reinstall, I can see the one with the OS, as it was formated during the reinstall, but as for the other 2, they are not available. Windows recognized those partitions as not formatted and when I click on them the OS says that before using the partition it needs to be formated. I was hoping that by installing the Drive Encryption Software it will be easy to recover those partitions, but apparently it wasn't. I have my old spare key stored on a external USB device, but when I was trying to recover following the guidelines I found in the Help section of the HP Client Security app (via the login screen after a restart) I run into an error. 0xa1 I believe. Is there any way to recover those partitions? I wouldnt want to format them and loose all my data. Pls advise. Thank you

    I am sure that is not a surprising answer, have you thought about Bitlocker http://windows.microsoft.com/en-US/windows7/products/features/bitlocker
    - you need Win 7 Ultimate or Enterprise
    - works great with TPM (without TPM look in Win 8)
    - manage it with in AD (with an Enterprise Agreement you can do MBAM)
    - add some scripts (WMI) for reporting
    - configure GPOs so that all recovery keys are stored centrally and make seperate backups of all recovery info in AD just in case the machine account gets deleted and recreated and you need after 2years the recovery key 
    My experience with 3rd parties are not good either, regardless who it was.
    Hope that helps,
    Lutz

  • My computer somehow restarted then deleted all my progress from Word documents. Is there any way to get these documents back without purchase of a data recovery software?

    Recently when I open my Mac the screen stays black until I press the start button a few times. Usually at this point it's in sleep mode. This time, however, the computer restarted completely, losing any word documents that I had left open prior. Is there any way I can recover these files without a purchase of a data recovery software? I've tried looking in the 'recent' tab, but it didn't save anything I have done in the last week, and finals are this coming week. Please help!

    If the system just Restarted on it's own, Shut down while you were working on something then started back up all those changes, edits, you had done in that app, document, are gone.

  • Listener Start Problem with TDE (Transparent Data Encryption)

    i am testing Transparent Data Encryption in Oracle 10g by using the following link
    http://oracle-base.com/articles/10g/TransparentDataEncryption_10gR2.php
    Before Implementing the TDE listener was running fine but after implementation of TDE the listener was unable to start
    Please check the steps which i follow
    Step1-
    specify the ENCRYPTION_WALLET_LOCATION parameter in the sqlnet.ora file, now SQLNET.ora file looks like the following
    SQLNET.AUTHENTICATION_SERVICES= (NTS)
    NAMES.DIRECTORY_PATH= (TNSNAMES, EZCONNECT)
    ENCRYPTION_WALLET_LOCATION=
    (SOURCE=(METHOD=FILE)(METHOD_DATA=
    (DIRECTORY=D:\oracle\product\10.2.0\wallet\)))
    please check the contents of listener.ora file,i didn't make any configuration changes for listener before or after implementation of TDE
    SID_LIST_LISTENER =
    (SID_LIST =
    (SID_DESC =
    (SID_NAME = PLSExtProc)
    (ORACLE_HOME = D:\oracle\product\10.2.0\db_1)
    (PROGRAM = extproc)
    LISTENER =
    (DESCRIPTION_LIST =
    (DESCRIPTION =
    (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC1))
    (ADDRESS = (PROTOCOL = TCP)(HOST = shakeel-pc.lhr.inov8.com.pk)(PORT = 1521))
    Step2-
    CONN sys/password AS SYSDBA
    ALTER SYSTEM SET ENCRYPTION KEY AUTHENTICATED BY "myPassword";
    TDE implemented successfuly implemented.
    But when i try to stop/start listener
    C:\>lsnrctl status
    LSNRCTL for 32-bit Windows: Version 10.2.0.1.0 - Production on 06-JUN-2008 05:44
    :30
    Copyright (c) 1991, 2005, Oracle. All rights reserved.
    Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=EXTPROC1)))
    STATUS of the LISTENER
    Alias LISTENER
    Version TNSLSNR for 32-bit Windows: Version 10.2.0.1.0 - Produ
    ction
    Start Date 05-JUN-2008 22:40:14
    Uptime 0 days 7 hr. 4 min. 16 sec
    Trace Level off
    Security ON: Local OS Authentication
    SNMP OFF
    Listener Parameter File D:\oracle\product\10.2.0\db_1\network\admin\listener.o
    ra
    Listener Log File D:\oracle\product\10.2.0\db_1\network\log\listener.log
    Listening Endpoints Summary...
    (DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(PIPENAME=\\.\pipe\EXTPROC1ipc)))
    (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=shakeel-pc.lhr.inov8.com.pk)(PORT=15
    21)))
    Services Summary...
    Service "PLSExtProc" has 1 instance(s).
    Instance "PLSExtProc", status UNKNOWN, has 1 handler(s) for this service...
    Service "orcl" has 1 instance(s).
    Instance "orcl", status READY, has 1 handler(s) for this service...
    Service "orclXDB" has 1 instance(s).
    Instance "orcl", status READY, has 1 handler(s) for this service...
    Service "orcl_XPT" has 1 instance(s).
    Instance "orcl", status READY, has 1 handler(s) for this service...
    The command completed successfully
    C:\>lsnrctl stop
    LSNRCTL for 32-bit Windows: Version 10.2.0.1.0 - Production on 06-JUN-2008 05:44
    :35
    Copyright (c) 1991, 2005, Oracle. All rights reserved.
    Connecting to (DESCRIPTION=(ADDRESS=(PROTOCOL=IPC)(KEY=EXTPROC1)))
    The command completed successfully
    C:\>lsnrctl start
    [i]LSNRCTL for 32-bit Windows: Version 10.2.0.1.0 - Production on 06-JUN-2008 05:44
    :40
    Copyright (c) 1991, 2005, Oracle. All rights reserved.
    Starting tnslsnr: please wait...
    TNSLSNR for 32-bit Windows: Version 10.2.0.1.0 - Production
    System parameter file is D:\oracle\product\10.2.0\db_1\network\admin\listener.or
    a
    Log messages written to D:\oracle\product\10.2.0\db_1\network\log\listener.log
    Error listening on: (ADDRESS=(PROTOCOL=tcp)(HOST=127.0.0.1)(PARTIAL=yes)(QUEUESI
    ZE=1))
    No longer listening on: (DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(PIPENAME=\\.\pipe\E
    XTPROC1ipc)))
    TNS-12560: TNS:protocol adapter error
    TNS-00583: Valid node checking: unable to parse configuration parameters
    Listener failed to start. See the error message(s) above...
    To start the listener i have to close wallet as
    1- SQL>conn sys as sysdba
    ALTER SYSTEM SET WALLET CLOSE;
    2- Replace the SQLNET.ora file as previous ,now SQLNET.ora contains
    SQLNET.AUTHENTICATION_SERVICES= (NTS)
    NAMES.DIRECTORY_PATH= (TNSNAMES, EZCONNECT)
    Now if i start the listener then the listener was started succesfuly
    Please suggest why listener is not being start with TDE?

    I have the same problem. I'm testing TDE using Oracle 11gR1. After setting the parameter encryption_wallet_location and restart the listener, the listener failed to start. The error is exactly the same
    TNS-12560: TNS:protocol adapter error
    TNS-00583: Valid node checking: unable to parse configuration parameters
    By removing the parameter encryption_wallet_location, the listner can be started successfully.
    Anyone can help?

  • Need suggestion for data encryption

    Hello Experts,
    I need your expert opinion on one of the data encryption method. We have some legal compliance to implement data encryption as listed below, lets say we have to apply encryption on 2 tables (1) TAB_A (2) TAB_B.
    (1) Need data encryption on the TAB_A & TAB_B for 2-3 columns and not the entire table.
    (2) Data should not be in readable format, if anyone connect to database and query the table.
    (3) We have reporting services on our tables but reporting services doesn't connect to our schema directly rather they connect to a different schema to which we have given the table Select grant.
    (4) Reports should work as it is, and users should see the data in readable format only.
    (5) There are batch processes which generates the data into these tables and we are not allowed to make any changes to these batch processes.
    This is a business need which has to be delivered. I explored various options such as VPDs, Data encryption methods etc but honestly none of these are serving our business need. There is also a limitation of encrypting data as data volume of quiet high (30TB DB) and generally users query the data on millions of records at a time. Also reports have very tight SLAs as well. If we create any encryption wrapper then decrypt will take longer in reports and will cause the SLA miss for reports.
    Could someone please suggest any better solution to me or if something is inbuilt in Oracle? We are using Oracle 11g.
    Regds,
    Amit.

    you can read about Transparent Data Encryption
    Check
    http://docs.oracle.com/cd/B28359_01/network.111/b28530/asotrans.htm

  • Data Recovery software

    how to recovery data from damage hard disk then i found on net i got a http://www.stellarinfo.co.in/
    which provide data recovery services i talked to them & they reply they have the solution of hard disk recovery, laptop data recovery, server recovery, raid data recovery i want to know that it there any problem to recover data from these company is it reliable

    Tenorshare Data Recovery is a powerful
    data recovery software. It not only support recovering data with Windows file system (FAT12, FAT16, FAT32, NTFS), but also Mac file system (HFS, HFS+) and Linux file system (EXT2, EXT3). Lost data due to virus attack PC, corrupted partition, drive crash,
    system sabotage, etc. can be retrieved easily with it.
    http://www.any-data-recovery.com/product/datarecoveryprofessional.htm

  • Data Recovery Software for the Zen Vision M

    Data Recovery Software for the Zen Vision M:
    Has anyone had any success recovering lost sound files from a Vision M, with software, physical repair services, or otherwise? Does anyone claim to be able to recover information from these devices?
    The data recovery programs I have tried fail to recognize the dri've, since it doesn't show up in list of dri'ves for some reason (Is there a way to make this show up?). Any suggestions/ recommendations would be greatly appreciated as I lost over a year of recordings after an unexpected forced reformatting. How would one even go about finding someone for this job?
    Thanks, GW

    Haven't really tried the data recovery so I would like to know more about this one too.
    http://storeyourpicture.com/images/s...lectronics.jpg

  • Help needed! Usb Data recovery software for word documents?

    A friend of mine has saved ALL of her precious work on a USB pen, which for no apparent reason has stopped working!
    It isn't being recognised by windows, but my mac is detecting it with trial software which I cannot buy on my measly student income. Not doable.
    Is there any data recovery software available for macs which detect microsoft documents which is....ummm free?
    It's beginning to drive me mad I've been looking at this stupid pen for ages. But my mate has offered me 50 quid if I get it sorted, so I am persevering! Any help would be appreciated guys!

    You can try the free Demo version of Data Rescue. It does not detect Word files; it's looking for anything on the device that matches the criteria you set.
    Hope this helps,
    Mulder
    If my answer helped solve your problem, please consider awarding some points. Why Reward Points?
    iMac G4 700Mhz   Mac OS X (10.3.9)  

  • Data recovery software? Help?

    I lost most data and pics because I didn't backup first before recovering. In November I accidentally deleted all texts from my friend, and I tried to fix last night but ended up making things worse. Is there anything I can do to get all my data and pics back? I've researched data recovery software but not sure it's safe. Any help would be appreciated! Thanks

    http://support.apple.com/kb/HT1766  only way to get your data back, is to restore from a backup you create either thru itunes or icloud.

  • Hey yall.. I lost everything from my mac from a data encrypted error and now it won't let me download Lightroom off of the disk again onto my new mac. What should I do?

    Hey yall.. I lost everything from my mac from a data encrypted error and now it won't let me download Lightroom off of the disk again onto my new mac. What should I do?

    Hi Brennacoyle,
    Can you please share the error message that you are getting while trying to download on the new MAC ?
    Cheers,
    Kartikay Sharma

  • Are there any tools for data encryption and decryption ?

    Hi,
    i am using oracle 9i R2, i want encrypt my data. Are there any tools available in market.
    Please let me know the ways to do data encryption and decryption.
    Thanks in advance
    Prasuna.

    970489 wrote:
    using DBMS_OBFUSCATION_TOOLKIT.Encrypt /DESEncrypt we can't secure our password...So i am looking for an another alternative.As Blue Shadow said, what are you really trying to achieve?
    Encrypting a password is itself not secure. Anything that can be encrypted can be decrypted. That is why Oracle itself DOES NOT encrypt passwords.
    Surprised??
    Here's what Oracle does with passwords, and what others should be doing if they have to store them.
    When the password is created, the presented password - clear text - is concatenated with the username. The resulting character string is then passed through a one-way hashing function. It is that hashed value that is stored. Then when a user presents his credentials to log on to the system, the presented credentials are combined and hashed in the same manner as when the password was created, and the resulting hash value compared to the stored value.

  • Data encryption in oracle 8i and 9i

    Hi,
    I would like to know how data encryption in Oracle 9i
    differes from that of Oracle 9i database.
    Thanks in advance
    Shinto

    What is your national character set? What is NLS_LENGTH_SEMANTICS set to?
    Justin
    Distributed Database Consulting, Inc.
    http://www.ddbcinc.com/askDDBC

Maybe you are looking for