Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Can the computer which has been used for encryption be
traced?

Answer Posted / sreenath

No, nothing is saved that permits tracing.

Is This Answer Correct ?    2 Yes 6 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the disadvantages of public-key cryptography compared with secret-key cryptography?

858


What is cryptographic synchronisation?

2197


Do encrypted files contain password in some form?

2115


What are knapsack cryptosystems?

927


How do certifying authorities store their private keys ?

2505


why hash functions are not used for encryption but authentication ?

1910


what is pretty good privacy?

1926


What is multiple encryption?

960


What is probabilistic encryption?

957


How to I prevent other users from using Kryptel (Silver Key)?

1947


What are the ecb and cbc modes?

978


Do digital signatures help detect altered documents and transmission errors?

1053


Is there a limit on the file size or on the number of encrypted files?

1971


What is the Popular Symmetric-Key Encryption Method

940


What is merkles tree signature scheme?

890