Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is Kerberos?

Answer Posted / madan kumar pc

Kerberos is also called as a third party authentication who
generate keys for transmission of messages

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain 1-persistent, p-persistent and 0-persistent CSMA giving strong and weak points of each.

3053


Why TCP/IP reference model is more popular than OSI model ?

3051


what is buffering and flooding in NIC ?

2455


Define Enterprise Networks

1116


What is the range of addresses in the classes of internet addresses

1140


Does Ethernet 10Gbps support multiple access

2264


Define CableServe

1179


what is piggy backing?

1164


how many types of backups are there & explain them in theory mode & practical mode?

2102


hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

2036


How to create dynamic users on simple Asterisks server for simple extension based x-change?

2192


Outline and discuss the main fields in Ethernet IEEE 802.3 frame. What are the main objectives of preamble ?

1873


what are the two sub layers of data link layer called ?

2069


What is traffic shaping

1147


Why does ATM use the cell of small and fixed length ?

2594