Security Basics mailing list archives
Re: How operative systems use cryptography
From: André Silaghi <andre.silaghi () googlemail com>
Date: Wed, 8 Aug 2012 11:18:49 +0200
It depends on which System you are using but in general you may use VPN connections. Those may use MSCHAP on windows. Your remote control for Linux could also be by ssh which Users RSA and/or DSA. There are many cryptographic systems in use there. Am 07.08.2012 um 22:53 schrieb haZard0us <hazard0us.pt () gmail com>:
Hello all, This may like a silly question - no problem, I'm kind of silly in this area - but I want to know where and how operative systems use it. I've searched on google but all I found is about password hashing. And because probably it's used somewhere else, I'm here asking the help for the OSes gurus :) Cheers! --haZ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- How operative systems use cryptography haZard0us (Aug 07)
- Re: How operative systems use cryptography André Silaghi (Aug 08)
- Re: How operative systems use cryptography Clement Dupuis (Aug 08)