- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Ginni has Published 1580 Articles
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
959 Views
Packet filtering is controlling access to a network by inspecting the incoming and outgoing packets and letting them move or halting them depends on the IP address of the source and destination. Packet filtering is one technique for implementing security firewalls.Packet filtering is both a tool and a method that ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
732 Views
There are various types of Proxy Server which are as follows −Forward Proxy Server − A forward proxy is a type of proxy server that generally passes requests from users in an internal network to the internet through a firewall.Forward proxies are configured to allow or deny the user's request ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
253 Views
A proxy server is an intermediary server that fetch data from an Internet source, including a webpage, on behalf of a user. They act as more data security boundaries securing users from malicious events on the internet.Proxy servers have some uses, and it is based on their configuration and type. ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
716 Views
DMZ stand for the Demilitarized Zone. It defines a host or network that acts as a secure and intermediate network or path among an organization's internal network and the external, or non-propriety, network. It is called a network perimeter or perimeter network.DMZ is generally implemented to secure an inside network ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
124 Views
There are many creative ways that unscrupulous people use to access or abuse unprotected computers which are as follows −Remote login − When someone is able to connect to the computer and control it in some form. This can range from being able to view or access the document to ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
1K+ Views
A firewall can be represented as a specific type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a represented group of security rules. It facilitates as a barrier between inside private networks and outside sources (such as the public ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
3K+ Views
Kerberos is a network authentication protocol designed to support powerful authentication for client/server applications using secret-key cryptography. Kerberos provides the largest level of security to network resources.Kerberos was produced by MIT as a solution to these network security issues. The Kerberos protocol uses powerful cryptography so that a user can ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
3K+ Views
PGP creates use of four types of keys including one-time session symmetric keys, Public keys, Private keys, and Passphrase based symmetric keys.Session key generation − Each session key is related to a single message and is used only for the goals of encryption and decrypting that message. Remind that message ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
16K+ Views
PGP includes the following services which are as follows −Authentication − The hash function used is SHA-1 which makes a 160 bit message digest. EP (DP) defines public encryption (decryption) and the algorithm used can be RSA or DSS.The set of SHA-1 and RSA supports an effective digital signature scheme. ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
Ginni
3K+ Views
PGP stands for Pretty Good Privacy. It is an encryption program that uses cryptographic privacy and authentication to online communications. PGP is most generally used for maintaining contents of emails encrypted and private. PGP is accessible as a plugin for some e-mail clients, including Claris Emailer, Microsoft Outlook/Outlook Express, and ... Read More