Tech Insider					     Technology and Trends

			      USENET Archives

From: (Jack Lupic)
Date: 1996/12/11
Message-ID: <>
X-Deja-AN: 203469584
organization: Sprynet News Service


  REDWOOD SHORES, California, December 9, 1996 -- Pretty
  Good Privacy, Inc. (, the world leader in
  digital-privacy software for individuals and
  businesses, today announced PGPmail 4.5, an upgraded
  version of the world's most popular method for
  transmitting encrypted email messages and attachments
  securely over the Internet or corporate intranets. The
  stand-alone product especially benefits the millions of
  users of QUALCOMM's popular Eudora email packages by
  delivering a toolbar plug-in.

  In addition to the new tight integration with Eudora,
  PGPmail 4.5 is specially designed for the 32-bit
  architecture of Windows 95/NT and supports MS-DOS, Mac
  OS, UNIX and earlier versions of Windows.

  PGPmail 4.5 is an upgraded version of Pretty Good
  Privacy's core PGP email encryption product, originally
  developed and distributed as freeware in 1991 by Philip
  Zimmermann. Pretty Good Privacy's encryption software
  is now used by millions of individuals and
  corporations, and has since become the de facto
  standard for secure digital communications.

  "In traditional, non-digital communications,
  privacy is easy. We write a letter, sign it,
  and seal it in an envelope. The same should
  be true in the digital world -- people need
  trusted, easy-to-use ways to protect their
  messages and data," said Philip Zimmermann,
  Chairman and Chief Technology Officer of
  Pretty Good Privacy. "PGPmail 4.5, with tight
  integration with Eudora, will make privacy an
  easily accessible toolbar item."
  Using Pretty Good Privacy's trusted PGP encryption
  [Service and Supportechnology, millions of Eudora
  users will be able to
  send electronic information transparently over public
  and private networks without risk of interception.
  Users will be able to encrypt, decrypt, verify and sign
  options from Eudora's toolbar -- much as they select
  the priority of a message from Eudora today. Pretty
  Good Privacy, Inc. will shortly announce additional
  toolbar plug-ins for other popular email packages.

  Without the use of encryption technology, email
  communications can be intercepted and read using widely
  available packet-sniffing software. Encryption
  technology "scrambles" email messages and ensures that
  messages can only be read by the intended recipient.
  Encryption is important in today's world, where public
  networks are used to transmit sensitive documents, such
  as legal contracts, medical records, and other
  confidential communications.

  PGPmail is based on a public key cryptography system
  that allows each user to generate a public key (which
  can be distributed openly) as well as a private key
  (which is never shared). The public key is used to
  encrypt messages to a recipient. The private key is
  used to decrypt those messages.

  New features, as a result of the 32-bit architecture,
  for Win95/NT include:

     * MAPI support. Since PGPmail supports the Microsoft
       Mail Application Program Interface (MAPI), users
       can use PGPmail with Microsoft Exchange or
       compatible email programs to send encrypted or
       digitally signed documents directly from within
       the PGP application.
     * Application launch from within PGPmail. To view a
       decrypted file quickly, a user simply clicks the
       launch button to automatically start the
       associated application and view the content.
     * Access to PGPmail functions from the Explorer.
       Users can implement PGPmail functions from the
       Explorer, including both encrypting/signing and

  For corporate customers, Pretty Good Privacy, Inc. will
  continue to provide key features tailored specifically
  to the needs of businesses, such as:

     * Corporate Message Recovery. Fulfills the need by
       network administrators to recover crucial
       encrypted data in the event of an employee's
       departure. This is done automatically by adding a
       corporate key as an extra recipient that can
       decrypt the message.
     * Certified Key Retirement. Provides an individual
       the ability to retract a prior certified key
       signature on someone else's key. For corporations
       this is useful when employees leave the company.
       In those cases, the key is no longer certified by
       the network administrator.
     * Flexible Command Control. Enables easy
       customization of features and commands by editing
       the appropriate INI files within PGPmail 4.5 to
       enable or disable commands.
     * Enclyptor. Empowers users to conveniently encrypt
       text or add digital signatures in most popular
       email and word processing programs without leaving
       the program via a function toolbar.

  PGPmail 4.5 will be available for download from the
  Pretty Good Privacy's website ( in January
  1997. Pricing will be announced by January 1997.

  System Requirements
  Operating system: MS-DOS, Microsoft Windows 3.x,
  Microsoft Windows 95, MacOS System 7, or UNIX. 32-bit
  version requires Windows 95 or Windows NT 4.0 and
  16-bit version requires Windows 3.x or later.
  Memory: 1 MB RAM
  Disk space: 1.5 MB

  Mike Nelson <>
  Todd Coffin <>
  Pretty Good Privacy, Inc.
  415.654.3203, extension 3227

   Copyright � 1996 Pretty Good Privacy, Inc., All Rights
  Reserved. PGP, Pretty Good, and ViaCrypt are registered
      trademarks of PGP, Inc. Pretty Good Privacy is a
                  trademark of PGP, Inc.

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO v IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or

Electronic mail:			       WorldWideWeb: