by Dinesh Thakur Category: Security

• There are a number of popular message digest algorithms known as MDn for various values of n.

• MD5 is the most popular and is fifth in a series of message digests designed by Ronald Rivest.

 
by Dinesh Thakur Category: Security

VPN (Virtual Private Network) Definition: VPN meaning that it is a private point-to-point connection between two machines or networks over a shared or public network such as the internet. VPN (Virtual Private Network) technology, can be use in organization to extend its safe encrypted connection over less secure internet to connect remote users, branch offices, and partner private, internal network. VPN turn the Internet into a simulated private WAN.

A VPN client uses TCP/IP protocol, that is called tunneling protocols, to make a virtual call to VPN server.



 
by Dinesh Thakur Category: Security

• Message authentication ensures that the message has been sent by a genuine identity and not by an imposter.

• The service used to provide message authentication is a Message Authentication Code (MAC).

 
by Dinesh Thakur Category: Security

A user remotely located must be first authenticated before accessing the network or Intranet of an organization. The authentication procedures must be built into the firewall applied to the network or Intranet for the security measures. The procedures to validate remote login or access have been described in the following lines along with their comparison and features:

 

Page 2 of 2

About Dinesh Thakur

Dinesh ThakurDinesh Thakur holds an B.SC (Computer Science), MCSE, MCDBA, CCNA, CCNP, A+, SCJP certifications. Dinesh authors the hugely popular blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps. For any type of query or something that you think is missing, please feel free to Contact us.



Search Content