explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
No Answer is Posted For this Question
Be the First to Post Answer
What are the two types of security policies?
What are the types of phishing attacks?
1- what is PHP ? 2- what is TS getway and TS application ? 3- what is channel in telecom and y we use ? 4- what is difference between spyware and mallware ? 5- what is main difference between standard and extended ACL ? please repley in sequence
What is the principle of least privilege?
What is information security?
How can i check registry of the New Installing software.
How does the HTTP handle state?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
Explain what are all the technical steps involved when the data transmission from server via router?
I want to reset the passwords of 100 users.how do you do it?
Explain how do we use rsa for both authentication and secrecy?