The process of converting cipher (scrambled) text back into plain, readable text. Recipients decrypt (unlock) the e-mail messages, macros, or programs sent to them by using the private key that matches the public key used for encryption.
Contains a private key that stays on the originator’s computer and a certificate (with a public key). The certificate is sent with digitally signed messages or included with macros or programs. Recipients save the certificate and use the public key to encrypt messages to the sender.
Confirms that an e-mail message, macro, or program originated from a trusted source who signed it. Also confirms that the message, macro, or program has not been altered. Includes the signer’s certificate (with the public key).
A folder where a collection of files is stored amid the files often using the same template. Each file in a library is associated with user-defined information that is displayed in the content listing for that library.
In Windows 2000 or later, a method of granting administrator rights to an installation program to modify system areas of the Windows registry or password-secured folders of a hard disk. Can be accomplished by logging on with administrator rights, advertising the program, giving administrator rights to all Windows Installer programs, or using Microsoft Systems Management Server. See also advertise.
The process of encoding data to prevent unauthorized access. An encrypted message is unreadable to all but the recipient, who has a public key that will decrypt it because the key matches the private key that the sender used to encrypt it.
High level of encryption. Uses a 128-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.
Low level of encryption. Uses a 40-bit key to scramble the contents of a file or data packet to make the data unreadable without the decryption key.