Suchergebnisse

Ergebnisse der Google-Website[Quelltext bearbeiten]

Lade …

Wikiergebnisse[Quelltext bearbeiten]

Ergebnisse 1 bis 18 von 18
Erweiterte Suche

Suche in Namensräumen:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • Information security generally deals with the security of data and minimization of security risks when dealing with the same. | [[Dateiverschluesselung_einsetzen/en|Using Data Encryption]] || All
    1 KB (180 Wörter) - 12:05, 22. Nov. 2023
  • |translated title=Encrypting external data storage with BitLocker …ents and in this case should be secured accordingly. In addition to direct encryption of the files needing protection, external storage devices can also be compl
    3 KB (509 Wörter) - 11:33, 9. Apr. 2021
  • |translated title=Zoom - Using end-to-end encryption …erborn is provided by a company located in Germany (Deutsche Telekom). TLS encryption can’t secure the conversations against access of zoom or the Deutsche Tel
    4 KB (618 Wörter) - 13:27, 24. Nov. 2023
  • |translated title=Using Data Encryption This article explains which software options are available for data encryption and how they can be used in practice.
    10 KB (1.525 Wörter) - 10:01, 21. Feb. 2024
  • |translated title= Keeping Your Data Secure If you want to keep your data safe, it may be useful to encrypt it.
    11 KB (1.622 Wörter) - 10:58, 26. Okt. 2022
  • |translated title=Data Encryption with 7-ZIP under Linux If you want to send documents containing personal data by email, you can protect them from unauthorized access by encrypting them.
    3 KB (561 Wörter) - 10:58, 13. Jul. 2021
  • …he help of a master password you can secure all your passwords and account data, so that you can use various long and complicated and therefore secure pass * [[Nutzung des Sciebo-Clients/en|Using the Sciebo Client]]
    3 KB (526 Wörter) - 15:04, 14. Sep. 2022
  • |translated title=Sharing Data Securely This article explains how to share data securely with other people over the Internet. It also explains VPNs, with…
    8 KB (1.300 Wörter) - 10:58, 26. Okt. 2022
  • …ions from the developer (Zoom) and operator (Deutsche Telekom) to increase data protection and security in conferences. The IMT sets some of the options ce …d has concluded the necessary data processing contracts in accordance with data protection law.
    11 KB (1.582 Wörter) - 10:02, 10. Apr. 2024
  • |translated title=File Encryption with 7-ZIP under Windows 10 If you want to send documents containing personal data by e-mail, you can protect them from unauthorized access by encrypting them
    2 KB (320 Wörter) - 12:31, 27. Apr. 2023
  • |translated title= Using the Sciebo Client …nd out more about what you need to consider if you want to store sensitive data in your cloud:<br>
    5 KB (845 Wörter) - 09:13, 1. Mär. 2024
  • Phishing attempts are an increasingly frequent attack on user data and are sometimes more, sometimes less easily distinguishable from "real"… == S/MIME certification and encryption ==
    4 KB (641 Wörter) - 11:14, 24. Okt. 2023
  • …aching. It cannot be guaranteed that all students have a sufficiently good data connection to be able to participate in such formats without interference. …</u>]]!! [[Zoom - Veranstaltung planen und anlegen|Zoom <u>without</u> E2E-Encryption]]!! WebEx
    6 KB (834 Wörter) - 10:12, 10. Apr. 2024
  • …erences are required for small groups (max. 23 participants), we recommend using the BigBlueButton system operated at the University of Paderborn or the DFN …se instances are hosted in Europe and for which contracts for commissioned data processing have been concluded.
    7 KB (1.037 Wörter) - 10:06, 10. Apr. 2024
  • VeraCrypt is a software that allows different types of encryption, especially of removable media and hard disks, but also of encrypted contai …t the drive, this can lead to conflicts in the synchronisation and loss of data in the worst case. <br>
    7 KB (1.116 Wörter) - 20:17, 14. Dez. 2020
  • Boxcryptor is a data encryption tool that can be used for free for private use with a single encrypted fold …tep, make sure to adjust the setting regarding the collection of anonymous data according to your preference.
    4 KB (635 Wörter) - 14:26, 3. Feb. 2023
  • The following routers can be set up using the following instructions: …the left-hand connection of the socket. It is marked with a '''D''' for ''data''.
    5 KB (830 Wörter) - 12:48, 11. Dez. 2023
  • …n password makes it more difficult for unauthorized persons to access your data and prevents misuse of your university account (viewing grades, false regis …lation to you (no names of family members, pets or friends and no birthday data).
    7 KB (1.040 Wörter) - 14:17, 6. Mär. 2024
Cookies helfen uns bei der Bereitstellung des IMT HilfeWikis. Bei der Nutzung vom IMT HilfeWiki werden die in der Datenschutzerklärung beschriebenen Cookies gespeichert.