More on private keys

Further information on how to save private keys and certificates for workstation users.

This Content Component encountered an error

More on private keys
David Gabel

A subscriber to this tip e-mail wrote, after our mailing of the Security tip of last week, the following missive. "'You should ensure that users have a backup of their file-encryption certificate and corresponding private key.'" This sounds pretty important doesn't it? The tip should have included additional information regarding this."

Indeed, this is pretty important, and we had thought to include that information in our last tip, but didn't, because the tip was pretty long, and brevity, being the soul of wit, is also something cherished of editors.

But ask, and ye shall receive. This tip discusses the very information that our reader wanted.

Got a Windows security tip of your own? Why not send it in? We'll grant you instant fame by posting your tip on our Web site, and we'll enter you in our tips contest for some nifty prizes.


The best place to find more info on the subject is the Windows help file. In case you haven't found these yet, you can simply place your cursor somewhere on the desktop, and press F1. When the help file appears, click on the Index tab, and in the dialog box type in private. You'll see two entries for Private Keys, defined and encryption, recovery.

Click on encryption, recovery, and you'll see step-by-step instructions for creating an encryption certificate, and for saving it, and its associated private key, to a floppy disk, as well as pointers to other information that will tell you more, probably, than you wanted to know, about this topic.


David Gabel is the Executive Technology Editor of SearchWin2000 parent company TechTarget.

Did you like this tip? E-mail to let us know.

Related Book

Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, 2/e
by Warwick Ford and Michael S. Baum
Online Price: $49.99
Publisher Name: Prentice Hall
Date published: December 2000
Summary:
Co-authored by the leading e-commerce security specialist and a leading legal specialist in e-commerce, this book offers a complete blueprint showing companies how to implement state-of-the-art e-commerce while minimizing all the security risks involved.


This was first published in October 2001
This Content Component encountered an error

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchWinIT

SearchEnterpriseDesktop

SearchVirtualDesktop

Close