Explain Kerberos Protocol ?
Answers were Sorted based on User's Feedback
Answer / pervez rauf khan balrampuri
It is an authentication service developed at Massachusetts
institute of technology.Kerberos uses encryption to prevent
intruders from discovering passwords and gaining
unauthorized access to files.
| Is This Answer Correct ? | 5 Yes | 3 No |
Answer / manju,amarjit,parminder,raj,si
kerberos was developed at Massachusets Institute of
Technology.kerberos uses a Kerberos Domain Controller
(kdc).the kerberos ticket is proof that the client has
permission to access the resource.
| Is This Answer Correct ? | 1 Yes | 1 No |
layers of osi model?
FTP?
where do we use the wild card masking in the routing protocols?
Expand PDF
Where i can get the objective type question for Voip. please let me know soon.
What is the difference between Cognos Reportnet features and Business Objects???
what are the service primitives present in cn?
What is SPAN or RSPAN?
Hi I have 10+ years of telecom application development experience ( telecom billing product -call control (ISUP/INAP/CAMEL call handling), short message routing application, telecom tools development). I am very strong in C++/Unix , core java and advanced oops design. Recently I have undergone a training in 3G mobile protocol developement. I have very good knowledge about WCDMA, its various layers and gone through 3GPP technical specs. Now I am looking for 3G mobile development opportunities. I am finding very difficult to get it, as I don't have the relevant experiences on 3G development. Please advice me on this to enter into mobile protocol development.
What is DMZ?
what is the ethernet interface?where and when we can use? how to connect hte host systems to target system
expand FTP