RE: Outlook e-mail Encryption

2002-02-08 Thread Ed Crowley
Encryption is Rearranging data bits. You really want what? Ed Crowley MCSE+Internet MVP kcCC+I Tech Consultant Compaq Computer Corporation Protecting the world from PSTs and Bricked Backups! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Brian Ko

RE: Outlook e-mail Encryption

2002-02-08 Thread Ken Cornetet
First, your users need certificates. You can buy these, or you can roll your own - read up on this. Next, Have each user install their cert on their PC. The recipients' public keys need to be somewhere where outlook can see them. You can set up an Exchange KMS server and essentially put the

RE: Outlook e-mail Encryption

2002-02-08 Thread Hunter, Lori
http://www.entrust.com/products/desktop/email/ I haven't rolled it yet, but it's the Citi standard so I don't have a choice on WHAT I roll, just when. -Original Message- From: Brian Ko [mailto:[EMAIL PROTECTED]] Sent: Friday, February 08, 2002 11:05 AM To: Exchange Discussions Subject:

RE: Outlook e-mail Encryption

2002-02-08 Thread Brian Ko
PROTECTED]] On Behalf Of Ed Crowley Sent: Friday, February 08, 2002 11:25 AM To: Exchange Discussions Subject: RE: Outlook e-mail Encryption Encryption is Rearranging data bits. You really want what? Ed Crowley MCSE+Internet MVP kcCC+I Tech Consultant Compaq Computer Corporation Protecting the world

RE: Outlook e-mail Encryption

2002-02-08 Thread Chinnery Paul
] [mailto:[EMAIL PROTECTED]] On Behalf Of Ed Crowley Sent: Friday, February 08, 2002 11:25 AM To: Exchange Discussions Subject: RE: Outlook e-mail Encryption Encryption is Rearranging data bits. You really want what? Ed Crowley MCSE+Internet MVP kcCC+I Tech Consultant Compaq Computer Corporation

RE: Outlook e-mail Encryption

2002-02-08 Thread Brian Ko
Thank you for your advice! Brian -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Ken Cornetet Sent: Friday, February 08, 2002 12:25 PM To: Exchange Discussions Subject: RE: Outlook e-mail Encryption First, your users need certificates. You can buy