Search


PDF Archive search engine
Last database update: 17 May at 11:24 - Around 76000 files indexed.


Show results per page

Results for «encrypted»:


Total: 200 results - 0.021 seconds

SSH Session Structure 100%

Using various encryption technologies, SSH provides a way to establish an encrypted connection between two computers, authenticating each side to the other, and passing commands and output back and forth.

https://www.pdf-archive.com/2018/02/05/ssh-session-structure/

05/02/2018 www.pdf-archive.com

Assignment4-CryptoFS-SP17 99%

The file system blocks on the disk are to be encrypted using the AES (Advanced Encryption Standard) algorithm on a per-file basis.

https://www.pdf-archive.com/2017/06/03/assignment4-cryptofs-sp17/

03/06/2017 www.pdf-archive.com

Forensic Recovery of Scrambled Telephones 98%

Writing to a mapped device gets encrypted and reading from it gets decrypted.

https://www.pdf-archive.com/2013/06/15/forensic-recovery-of-scrambled-telephones/

15/06/2013 www.pdf-archive.com

ZOC SSH Features 95%

ZOC SSH Specific Features • Based on industry reference implementation OpenSSH • Client supports latest encryptions like ED25519 SHA256, SHA2 or AES-256ctr • SSH Public key, keyboard interactive or password authentication • Dynamic port forwarding (client as a SOCKS proxy) • X11 forwarding (lets you run X-Windows applications from the remote session) • Static port forwarding (tunneling of connections to remote destinations) • Proxy support (client connects to server through http/socks4/socks5) • SSH Agent forwarding between client and server • Client side SSH key generator • SFTP file transfer • SSH Keep-Alive http://www.emtec.com/ SSH Feature Details Key Exchange An especially difficult part of encrypted communication is the need to negotiate a shared secret (the key to use for encryption) over a public channel that could already be compromised.

https://www.pdf-archive.com/2018/02/05/zoc-ssh-features/

05/02/2018 www.pdf-archive.com

Kryptovoip Encrypted Software 94%

The abovementioned app will allow you to make and receive encrypted phone calls thank to the use of Internet connection, via WiFi or mobile 3G or 4G LTE data.

https://www.pdf-archive.com/2016/06/18/kryptovoip-encrypted-software/

18/06/2016 www.pdf-archive.com

NSA-Black-Paper 93%

Encrypt Your Emails.....................................................................................................................11 Encrypted Email for OS X / Windows / Linux............................................................................11 Encrypted Email for Android.......................................................................................................11 Encrypted Email for iOS..............................................................................................................11 Secure Your Chat and Text Messages.....................................................................................................12 Encrypted Chat for OS X / Windows / Linux..................................................................................12 Cryptocat....................................................................................................................................12 Pidgin / Adium / Jitsi..................................................................................................................14 Encrypted Chat for Android.............................................................................................................14 Encrypted Chat for iOS...................................................................................................................14 Secure Your Voice Calls.........................................................................................................................15 Encrypted Voice Calls for OS X / Windows / Linux.........................................................................15 Jitsi + Ostel.co.............................................................................................................................15 Encrypted Voice Calls for Android...................................................................................................16 CSipSimple app + Ostel.co..........................................................................................................16 RedPhone....................................................................................................................................16 Encrypted Voice Calls for iOS..........................................................................................................16 Groundwire app + Ostel.co.........................................................................................................16 Platform Independent Voice Call Encryption...................................................................................16 Silent Phone................................................................................................................................16 Secure Your Stored Data........................................................................................................................17 ...on your harddrive..........................................................................................................................17 ...in the cloud...................................................................................................................................17 Secure Your Payments............................................................................................................................18 The Bottom Line &

https://www.pdf-archive.com/2013/06/24/nsa-black-paper/

24/06/2013 www.pdf-archive.com

SecureWinsock 92%

Verify message integrity by hashing the plaintext session key and comparing it to the hash value Both parties now hold the session key for fast encrypted communication The above steps can be implemented by using the following wincrypt functions, not in any particular order:

https://www.pdf-archive.com/2016/01/02/securewinsock/

02/01/2016 www.pdf-archive.com

npatel 91%

The name “Tor” is an acronym standing for “The Onion Router”, which is the protocol used to bounce a user’s encrypted request across multiple servers in the onion network.

https://www.pdf-archive.com/2017/08/15/npatel/

15/08/2017 www.pdf-archive.com

assignment1 90%

When the connection has been established, subsequent communication during the session is encrypted using the agreed methods and keys.

https://www.pdf-archive.com/2016/11/21/assignment1/

21/11/2016 www.pdf-archive.com

Mobile-Implants 89%

Unfortunately, no.Attackers gain an access to the messages before they are encrypted and sent.

https://www.pdf-archive.com/2017/05/15/mobile-implants/

15/05/2017 www.pdf-archive.com

Make a backup using iCloud and iTunes 87%

If you don't need to save your Health and Activity data, you can make a backup that isn't encrypted.

https://www.pdf-archive.com/2016/04/11/make-a-backup-using-icloud-and-itunes/

11/04/2016 www.pdf-archive.com

Test 4 Spear BitGo Keycard for Test-Wallet 87%

User Key This is your private key, encrypted with your passcode.

https://www.pdf-archive.com/2017/06/04/test-4-spear-bitgo-keycard-for-test-wallet/

04/06/2017 www.pdf-archive.com

20170626 BitGo Keycard Test-Wallet 87%

User Key This is your private key, encrypted with your passcode.

https://www.pdf-archive.com/2017/06/27/20170626-bitgo-keycard-test-wallet/

27/06/2017 www.pdf-archive.com

Should we win the fight 87%

In order to make sure that your internet traffic is anonymous while traveling through the Tor network, data is encrypted in layers.

https://www.pdf-archive.com/2014/08/29/should-we-win-the-fight/

29/08/2014 www.pdf-archive.com

Flat Earth - Satellite Internet - What Is Going On? 86%

As a result, EVERY request must be encrypted, using the customer’s unique identifier.

https://www.pdf-archive.com/2017/05/21/flat-earth-satellite-internet-what-is-going-on/

21/05/2017 www.pdf-archive.com

Zeus-Crimeware-Toolkit 86%

The Bot master can enter other banking sites here and Zeus will add them in the final encrypted configuration file when the “Build config” button is clicked.

https://www.pdf-archive.com/2011/03/26/zeus-crimeware-toolkit/

26/03/2011 www.pdf-archive.com

Renegotiating TLS 84%

At this point, bi-directional encryption has been negotiated, and future messages (including control messages) are encrypted between the peers.

https://www.pdf-archive.com/2013/09/29/renegotiating-tls/

29/09/2013 www.pdf-archive.com

Test 3 Spear BitGo Keycard for My BitGo Wallet 83%

User Key This is your private key, encrypted with your passcode.

https://www.pdf-archive.com/2017/06/04/test-3-spear-bitgo-keycard-for-my-bitgo-wallet/

04/06/2017 www.pdf-archive.com

Manual of Phone 82%

If you select WEP, WPA/WPA2 encrypted network, you must first enter the appropriate password, and then touch the connection.。  Note:

https://www.pdf-archive.com/2018/04/04/manual-of-phone/

04/04/2018 www.pdf-archive.com

0FuxGivenV3 80%

Your passwords and private messages will be stored and encrypted with SHA-256 and salted using a random MD5 key.

https://www.pdf-archive.com/2016/03/03/0fuxgivenv3/

03/03/2016 www.pdf-archive.com

guide-en 79%

If you have problems remembering passwords, use a secure encrypted program like KeePass to keep track of them.

https://www.pdf-archive.com/2012/10/19/guide-en-pdf/

19/10/2012 www.pdf-archive.com