Monday, October 7, 2013
What is Wifi technology? How does it work?
Posted by
Sunflower
at
10/07/2013 06:55:00 PM
0
comments
Labels: Access, attacks, Connection, Data, Devices, Encryption, Features, files, Information, Interface, Internet, LAN, Network, Packets, Recovery, Standards, Stations, Technology, Wifi, Wireless
![]() | Subscribe by Email |
|
Saturday, October 5, 2013
What is a transposition cipher method?
Posted by
Sunflower
at
10/05/2013 08:26:00 PM
0
comments
Labels: Characters, Cipher, Communication, Cryptography, Decoding, Encoding, Encryption, Functions, Implementations, Message, Methods, Protection, Secure, Security, Text, Transposition Cipher Method
![]() | Subscribe by Email |
|
Friday, October 4, 2013
What is a substitution cipher method?
Posted by
Sunflower
at
10/04/2013 08:10:00 PM
0
comments
Labels: Alphabets, Cipher, Cryptography, Encoded, Frequency, Letters, Methods, Process, Protection, Receiver, Secure, Security, Sender, Sequence, Substitution Cipher, System, Text, Types, Units
![]() | Subscribe by Email |
|
Thursday, October 3, 2013
What is Traditional Cryptography?
Posted by
Sunflower
at
10/03/2013 08:15:00 PM
0
comments
Labels: Algorithms, Application, Authentication, Cryptography, Data, Encrypt, Encryption, Information, Message, Modern, Protection, Protocols, Secure, Security, System, Techniques, traditional
![]() | Subscribe by Email |
|
Wednesday, October 2, 2013
What is link encryption method?
Posted by
Sunflower
at
10/02/2013 07:00:00 AM
0
comments
Labels: Application, Communication, Cost, Data, digital, Encrypt, Encryption, Information, Link Encryption Method, Method, Objectives, Protection, Safety, Security, System, traffic, Users
![]() | Subscribe by Email |
|
Tuesday, October 1, 2013
How can firewalls secure a network?
Posted by
Sunflower
at
10/01/2013 07:30:00 AM
0
comments
Labels: Application layer, attacks, Communication, Control, Data, Firewalls, Hardware, Layers, Network, Network layer, Networking, Packets, Protocols, Secure, Security, Software, System, Threats, traffic
![]() | Subscribe by Email |
|
Monday, September 30, 2013
What are the security problems faced by a network?
Posted by
Sunflower
at
9/30/2013 03:16:00 PM
0
comments
Labels: Administrator, Attack, Data, Encryption, Network, Networking, Passwords, Prevention, Problems, Protection, Risk, Secure, Security, Server, Software, System, Technology, Threats, Users, Web
![]() | Subscribe by Email |
|