Presented By: Public and Private Sector Perspectives on the Impact of the Technology


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News Presented By: Public and Private Sector Perspectives on the Impact of the Technology
# 1  
Old 08-22-2008
Presented By: Public and Private Sector Perspectives on the Impact of the Technology

Image August 4, 2008 Costa Rica is a country that seems to do well in rankings. It has ranked first in Latin America for environmental performance, press freedom, democracy and travel and tourism competitiveness. Unhappily, it has also scored highly on a less promising chart. ...www.cisco.com >> Subscribe to Feed
Ads by PheedoImage



More...
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Private and public key encryption

Hi, we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have? encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies

2. UNIX for Dummies Questions & Answers

Public and Private Key generation for scp

Hi, What tool is used to generate public and private keys for SCP? Do you have an example script that generates these keys, puts them in files and then another example script that references them from SCP? Thanks, (9 Replies)
Discussion started by: Astrocloud
9 Replies

3. Virtualization and Cloud Computing

Private, Public and Hybrid Clouds

Hi all, Private, Public and Hybrid Clouds I'm now testing OpenStack; Home OpenStack Open Source Cloud Computing Software -Infrastructure as a Service (IaaS) -Platform as a Service (PaaS) -Software as a Service (SaaS) It is an Open Source software. I'm interested to know whether... (0 Replies)
Discussion started by: satimis
0 Replies

4. Shell Programming and Scripting

sftp using private and public keys

hi guys , i have few files i have to do sftp, the public and private key work like a magic , no problem at all the syntax is as below sftp -0 identityfile=~/ure/blsl/loc2/.ssh/id_rsa_ssh1 ssh1@remote >log_dir/file.timestamp<<end lcd folder cd folder put * quit end ================ my... (3 Replies)
Discussion started by: rockymayavia
3 Replies

5. Shell Programming and Scripting

SFTP - Private and Public keys

Hi All, I have a query....say on server A, I have generated the Private and Public keys and shared the public key with server B. Now i can surelyconnect(without password) from server A to server B..... but can i similarly connect from server B to server A as well Regards (1 Reply)
Discussion started by: Arpit Narula
1 Replies

6. What is on Your Mind?

How would you analyze the impact of C language on computer technology?

What is extent of influence of C language? How essential is it in today's computer and IT technology? Do you think that the inventor of C language deserves more recognition than he appreciates now? (1 Reply)
Discussion started by: Anna Hussie
1 Replies

7. IP Networking

Setting up private and public ip on same machine.

Hi, We have a ftp server which is running on public ip and out side of firewall. Users out side of our network and users of our local network both using the same public ip and doing upload and downloading. Last few days we are facing bandwidth problem as internal network users increased. ... (1 Reply)
Discussion started by: abduljabbar_11
1 Replies

8. UNIX for Dummies Questions & Answers

ssh public/private Keys

Hello, I have an issue with an outside party trying to deliver a file to our server via SFTP. I have setup the .ssh directory under the home directory for the user account that is being used and setup the authorized_keys file with correct permissons etc for .ssh directory and file. We... (2 Replies)
Discussion started by: richo king
2 Replies

9. UNIX for Advanced & Expert Users

SSH public and private keys

Firstly, i apologise if i have posted in a wrong section of the forum. Please let me know which is the correct section my post should go to. I have to SCP a file from one server(server A) to another (server B). I read around that a secure way is to use public and private keys. Assuming my... (2 Replies)
Discussion started by: new2ss
2 Replies
Login or Register to Ask a Question
tpmtoken_import(1)					      General Commands Manual						tpmtoken_import(1)

							 TPM Management - tpmtoken_import

NAME
tpmtoken_import - import an X.509 certficate and/or an RSA key pair into the user's TPM PKCS#11 data store SYNOPSIS
tpmtoken_import [ OPTION ] FILE DESCRIPTION
tpmtoken_import imports a PEM formatted representation of an X.509 certificate and/or an RSA key contained in FILE. Importing an X.509 certificate creates an X.509 Public Key Certificate PKCS#11 object and also an RSA Public Key PKCS#11 object using the RSA public key contained in the certificate. The certificate's key must be an RSA key in order for the certificate to be successfully processed by this command. Importing an RSA key creates an RSA Public Key and an RSA Private Key PKCS#11 object. In order to associate the RSA PKCS#11 objects with an X.509 Public Key Certificate PKCS#11 object, the RSA PKCS#11 objects must have a subject name and key identifier associated with them. This can be accomplished by supplying the corresponding X.509 certificate as an optional command parameter. The input can contain PEM formatted representations of both an X.509 certificate and an RSA key. If both representations are present then an X.509 Public Key Certificate PKCS#11 object, an RSA Public Key PKCS#11 object and an RSA Private Key PKCS#11 object are created. -h, --help Display command usage info. -v, --version Display command version info. -l, --log [none|error|info|debug] Set logging level. -i, --idfile FILE Use FILE as the PEM formatted X.509 certificate input used to obtain the subject and id attributes -k, --token STRING Use STRING to identify the label of the PKCS#11 token to be used -n, --name STRING Use STRING as the label for the imported object(s) -p, --public Import the object(s) as a public object -t, --type key|cert Import only the specified object type -y, --yes Assume an answer of yes for any confirmation prompts that would normally be asked SEE ALSO
tpmtoken_init(1), tpmtoken_setpasswd(1), tpmtoken_objects(1), tpmtoken_protect(1) REPORTING BUGS
Report bugs to <trousers-users@lists.sourceforge.net> TPM Management 2005-04-25 tpmtoken_import(1)