Month: June 2011

Kerberos

Kerberos

The kerberos provides a secure, single-sign-on, trusted, third party mutual authentication service.  Kerberos is secure since it never transmits passwords over the network in clear. It is unique in its use of tickets, time-limited cryptographic messages that proves a user’s identity to a given server without sending passwords over the network. Single-sign-on means that end […]

Continue Reading

Digital Signatures

Digital Signatures

Digital Signatures : A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to verify the integrity of the message. It is necessary to the sender’s public key by the prior knowledge or by trusted third party. A digital signatures is created by using […]

Continue Reading

What is Steganography?

What is Steganography?

Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format. It happens somewhat like this. You hide the message or the private file that you wanna send to your friend X. But it is very private, you are afraid that […]

Continue Reading

You need to hack!

You need to hack!

Do you think “Why is it important?” The answer is yes it is very important because to catch a thief you must think like thief. To protect your system from all the attacks, it is most necessary that you must know about the attacks, hacks. It will be fruitful if you go positive towards it […]

Continue Reading