1. A growing variety of software programs are available to scramble your data so that only you can view it. 2. Encryption is a powerful technology used to scramble data so it is unreadable by outside parties. 3. Encryption technology is used to scramble data, such as electronic mail or credit-card information, when it is sent on the Internet. 4. Encryption programs scramble data so completely that only someone with a proper computerized key can read it. 5. Encryption software scrambles data as it travels across computer networks so it cannot be read by hackers. 6. Encryption uses a mathematical procedure to scramble data. 7. Internet software can largely scramble private data so that the information is difficult to intercept. 8. It scrambles data so that it can only be read by people with the correct, mathematically-derived code. 9. Most computer security experts say that real security on the Internet awaits the widespread adoption of encryption technology for scrambling data and authenticating messages. 10. None of these on-line services uses encryption to scramble the data sent over the Internet. |