Hi,
when you created your account here you accepted the Forum Rules. Rule 6 says no homework in the main forums, but there is a special forum for school work. Make sure you read and understand the special rules to post there.
The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography.
4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering
I don't think there is any coding since it is just configuring... (3 Replies)
Hi to all of you guys, I'm new here...
May this thread fits on this section. A friend of mine gave me this enigma to do, written in excel. I attach the file below, name New.xls.
Enigma:
There are 10^20 possibilities of tables (Table1, Table 2, Table 3, Table 4, Table 5,...), with ten rows (row... (3 Replies)
Hi,
I have a file which contains 4 columns. I want to encrypt only the first column. The rest of data must be as it is.
flat file:
12234333 jakdjf 394839 343874
73746373 5jdkfdj 383993 958939
83473843 lksdjfj 388383 349399
so, 1 should be replace by 4, 2 with 8, 3 with 7.....
the... (4 Replies)
As we know, firewall is designed to keep unauthorized outsiders from tampering with a computer system or network. We don't talk about computer security without cryptography.
In this case, may I know,How does cryptographic protection (at the TCP/IP layers or at the application layer) affect a... (1 Reply)