02-01-2012
Thanks for the link. However, i did not see any symmetric cryptography. Is it the same as the configuring NTP?
---------- Post updated at 09:50 AM ---------- Previous update was at 09:42 AM ----------
Thanks for the link. However, i did not see any symmetric cryptography. Is it the same as the configuring NTP?
4 More Discussions You Might Find Interesting
1. Cybersecurity
As we know, firewall is designed to keep unauthorized outsiders from tampering with a computer system or network. We don't talk about computer security without cryptography.
In this case, may I know,How does cryptographic protection (at the TCP/IP layers or at the application layer) affect a... (1 Reply)
Discussion started by: heroine
1 Replies
2. Shell Programming and Scripting
Hi,
I have a file which contains 4 columns. I want to encrypt only the first column. The rest of data must be as it is.
flat file:
12234333 jakdjf 394839 343874
73746373 5jdkfdj 383993 958939
83473843 lksdjfj 388383 349399
so, 1 should be replace by 4, 2 with 8, 3 with 7.....
the... (4 Replies)
Discussion started by: javeed7
4 Replies
3. What is on Your Mind?
Hi to all of you guys, I'm new here...
May this thread fits on this section. A friend of mine gave me this enigma to do, written in excel. I attach the file below, name New.xls.
Enigma:
There are 10^20 possibilities of tables (Table1, Table 2, Table 3, Table 4, Table 5,...), with ten rows (row... (3 Replies)
Discussion started by: lucky7
3 Replies
4. Red Hat
I have encountered some problems in my school work.
Here is the question:
The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography.
Much Appreciated!:) (1 Reply)
Discussion started by: wilsonljx
1 Replies