vfakap.blogspot.com
Network Security: Lab 3- Classic Cryptography
http://vfakap.blogspot.com/2009/10/lab-3-classic-cryptography.html
Thursday, October 29, 2009. Lab 3- Classic Cryptography. In this lab, we need to. Explain What is Symmetric and Asymmetric Cryptography. Implementing Caesar Cipher for Symmetric Cryptography. Implementing Vigeneré Cipher for Symmetric Cryptography. Plaintext : A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. Ciphertext : D E F G H I J K L M N O P Q R S T U V W X Y Z A B C. A caesar chiper with a key 3. Plaintext : THE ATTACK TONIGHT START AT EIGHT,. REGROUP AT STATION A. The Truck is heading toward t...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: FIREWALL
http://buzz-networksecurity.blogspot.com/2009/10/firewall.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Wednesday, October 28, 2009. If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall." . Subscribe to: Post Comments (Atom). Shall not b...
vfakap.blogspot.com
Network Security: July 2009
http://vfakap.blogspot.com/2009_07_01_archive.html
Tuesday, July 21, 2009. Introduction of Network Security. Kalo nk cite bab security(keselamatan) dlm IT ni mmg byk cara. Semuanya bergantung pada individu@organisasi tuk gne kaedah yg mn satu.setiap device(alatan) ada kelebihan&kekurangan yg tersendri. Semua perkara blh belajar sekarang ni dlm internet.taip je http:/ www.google.com. Semua org blh dpt maklumat@info yg di cari walaupun maklumat@info yg mungkin blh disalahgunakn. Method (kaedah) dlm keselamatan rangkaian:. 2- Tulus (Integrity) - maklumat yg...
vfakap.blogspot.com
Network Security: Authentification and Access Control
http://vfakap.blogspot.com/2009/10/authentification-and-access-control.html
Thursday, October 29, 2009. Authentification and Access Control. Verification and conformation on someone of identity who generated some data. It involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one. 1 Message come from apparent source or author. 2 Content are not be altered. 3 It was sent at a certain time or sequence. Choosing a good password. Also ca...
buzz-networksecurity.blogspot.com
.:: NetWork SecuRity ::.: October 2009
http://buzz-networksecurity.blogspot.com/2009_10_01_archive.html
Selamat Datang Ke Laman Blog buzz-networksecurity! WELCOME TO MY BLOG. View my complete profile. Thursday, October 29, 2009. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Cracking methods have become much more sophisticated and innovative with wireless. Cracking has also become much easier and more accessible with easy-to-use Windows or Linux-based tools being made available on the web at no charge. 54Mbps in 5Ghz range. Signal week by 3 factor:.
newbiznetwork.blogspot.com
Newbiz Network: Network Security Threats
http://newbiznetwork.blogspot.com/2009/11/network-security-threats.html
Sunday, November 1, 2009. The term virus has long been used generically to describe any computer threat, but in actuality it refers specifically to malware that inserts malicious code into existing documents or programs, and then spreads itself by various means. In addition to stealing personal information, maliciously-coded websites are also often designed for the following purposes:. Adware/ spyware/ reading cookies. XSS - cross- site scripting to utilize web browser flaws for other intentions. Brute-f...
newbiznetwork.blogspot.com
Newbiz Network: Wireless Security
http://newbiznetwork.blogspot.com/2009/11/wireless-security.html
Sunday, November 1, 2009. Overview of Wireless Technologies. As mentioned above wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections—without requiring network or peripheral cabling. Wireless technologies use radio frequency transmissions as the means for transmitting data, whereas wired technologies use cables. To simple devices such as wireless headphones, microphones, and other devices that do not process or store information. And Wireless...
newbiznetwork.blogspot.com
Newbiz Network: Computer Networks
http://newbiznetwork.blogspot.com/2009/11/computer-networks.html
Sunday, November 1, 2009. A computer network is a group of computers that are connected to each other for the purpose of communication. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of some types and categories and also presents the ba. Sic components of a network. Obtaining status information on other network users and their status. LAN - Local Area Network. WLAN - Wireless Local Area Network. WAN - Wide Area Network. Es a central con...
vfakap.blogspot.com
Network Security: Basic Cryptography
http://vfakap.blogspot.com/2009/10/basic-cryptography.html
Wednesday, October 28, 2009. It is a technique that has been use to hiding information from other people, and can be access by certain people only. It is been use to :. 1 scramble data in storage. 2 transmit data in the internet. 3 prevent from the user to understand the real message or information in the message that encrypt. Cryptographic system is divide by 2 :. 1 Cryptography : concerned with develop algorithm. 2 Cryptanalysis : obtained the meaning of encryption information. Can be divide by :.