Monday, October 14, 2013
What are secret-key and public-key signatures?
Posted by
Sunflower
at
10/14/2013 08:07:00 PM
0
comments
Labels: Algorithm, Application, Asymmetric, Authorization, Cryptography, digital, Encrypt, Encryption, Key, Message, Performance, Private, Public-key, Secret-key, Signals, Signature, Symmetric, System
![]() | Subscribe by Email |
|
Sunday, October 13, 2013
What are two fundamental cryptography principles?
Posted by
Sunflower
at
10/13/2013 06:00:00 AM
0
comments
Labels: attacks, Authenticate, Cryptography, Encrypt, Encryption, Errors, Fundamental, Host, Information, Integrity, Intruder, Messages, Principles, Recipient, Redundancy, System, update, Valid
![]() | Subscribe by Email |
|
Friday, October 4, 2013
What is a substitution cipher method?
Posted by
Sunflower
at
10/04/2013 08:10:00 PM
0
comments
Labels: Alphabets, Cipher, Cryptography, Encoded, Frequency, Letters, Methods, Process, Protection, Receiver, Secure, Security, Sender, Sequence, Substitution Cipher, System, Text, Types, Units
![]() | Subscribe by Email |
|
Thursday, October 3, 2013
What is Traditional Cryptography?
Posted by
Sunflower
at
10/03/2013 08:15:00 PM
0
comments
Labels: Algorithms, Application, Authentication, Cryptography, Data, Encrypt, Encryption, Information, Message, Modern, Protection, Protocols, Secure, Security, System, Techniques, traditional
![]() | Subscribe by Email |
|
Wednesday, October 2, 2013
What is link encryption method?
Posted by
Sunflower
at
10/02/2013 07:00:00 AM
0
comments
Labels: Application, Communication, Cost, Data, digital, Encrypt, Encryption, Information, Link Encryption Method, Method, Objectives, Protection, Safety, Security, System, traffic, Users
![]() | Subscribe by Email |
|
Tuesday, October 1, 2013
How can firewalls secure a network?
Posted by
Sunflower
at
10/01/2013 07:30:00 AM
0
comments
Labels: Application layer, attacks, Communication, Control, Data, Firewalls, Hardware, Layers, Network, Network layer, Networking, Packets, Protocols, Secure, Security, Software, System, Threats, traffic
![]() | Subscribe by Email |
|
Monday, September 30, 2013
What are the security problems faced by a network?
Posted by
Sunflower
at
9/30/2013 03:16:00 PM
0
comments
Labels: Administrator, Attack, Data, Encryption, Network, Networking, Passwords, Prevention, Problems, Protection, Risk, Secure, Security, Server, Software, System, Technology, Threats, Users, Web
![]() | Subscribe by Email |
|
Monday, September 16, 2013
What are the differences between inter-network routing and intra-network routing?
Posted by
Sunflower
at
9/16/2013 11:03:00 PM
0
comments
Labels: Connection, Data, device, efficient, Information, Infrastructure, Internetwork Routing, Intranetwork Routing, Network, Networking, Organization, Packets, Protocols, Resources, Router, Routing, Switch, System
![]() | Subscribe by Email |
|