explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
No Answer is Posted For this Question
Be the First to Post Answer
What is information security?
Is there any course for Hacking? How the people in become hackers?
Explain the difference between discretionary access control and mandatory access control?
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
How do we use rsa for both authentication and secrecy?
How does arp works?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is an information security management system (isms)?
What is broadband?What is bandwidth?What is frequency?
which of the following network components is PRIMARILY set up to serve as security measure by preventing unauthorzed traffic between different segments of the network?
Explain what are digital signatures and smart cards?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?