What is secured sucket layer and what is the requirement of
its in networking
Answers were Sorted based on User's Feedback
Answer / praveen rai
The secure socket layer protocol runs above the TCP/IP and
below higher level protocols such as HTTP or IMAP .SSL uses
TCP/IP on behalf of other higher protocols and in the
process allows and ssl enabled server to authenticate itlsef
to an ssl enabled client the client then atthenticates
itself to the server and both machine establish an encrypted
connection ssl works on port 443 .
there are two sub protocols for ssl record layer protocol
and handshake protocol .the later version of ssl is call tls
now
| Is This Answer Correct ? | 17 Yes | 2 No |
Answer / bill gates
evryone is reuning name of ma company n ma fake too
available here......its bill gates here......roflmaoooooo
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / subasheelaq
it is used to send packet of data from sender to receiver.
it issecured sacket. it is used in tcp/ip protocols.
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / bill gates
Vinay kumar looks like a microsoft socket maker created by
bill gates. LOL
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / guest
It is a socket ,created by vinay kuymar, any dout?
| Is This Answer Correct ? | 1 Yes | 4 No |
What is classful and classless routing?
Which are the different factors that affect the security of a network?
What is the idea behind the Bell-La Padula model?
why u choose storage domain?
What is the sense of a fingerprint?
What does cia stand for in security management?
Explain what are digital signatures and smart cards?
How do I recover My Hotmail Account without a phone number and email?
What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.
What are the types of phishing attacks?
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
what are the different types of datasets related to the network intrusion detection system?