Security
I have used this VPN in the past to connect to some internet networks but I did not understand the principle behind this VPN. I would like someone to kindly help me understand this system better. I need some ideas on how VPN works. What are the concepts behind VPN? Is it similar to cloud computing or they are entirely different?
- 548 views
- 1 answers
- 0 votes
I need a security expert to help me understand how to encrypt email. Could you explain some steps I can take to ensure that my emails remain confidential whenever I send them? How can I know that someone will not snoop on the email whiles it is in transit to its destination? Is there a way to detect compromised emails?
- 979 views
- 2 answers
- 0 votes
I have a website and we are going to implement some payment gateways for people who purchase items from my website. I do not know much about web security but I would like to know how the system works. I want to know how we can authentic the cards we will be receiving payment from.
- 791 views
- 2 answers
- 0 votes
Hashed and salted passwords are used in cryptography to reduce password vulnerability to hash attacks. What is the process of hashing? What is the process of salting? How do hashing and salting work to protect passwords from brute attacks? In this context, what is fingerprinting?
- 612 views
- 1 answers
- 0 votes
What is Cross Site Scripting? When do these occur? How is a cross site scripting attack executed? What are the categories of Cross Site Scripting Attacks? What is a Dom based XSS? Are XSS attacks severe and can they cause an account to be compromised? How can you protect a site from XSS attacks?
- 661 views
- 1 answers
- 0 votes
What is a Secure Socket Layer (SSL)? How does SSL work? If you are a trader, why is it important that you have SSL on your website? How can you identify if a website has a SSL? Who issues a SSL certificate? What are the details that are included in the certificate?
- 643 views
- 2 answers
- 0 votes
Symmetric encryption is faster but difficult to implement. Explain why? What is it also known as ?How does it work ?What is asymmetric encryption? What is its alternate name? What is its disadvantage? Explain the process of asymmetric encryption? What is the use of digital certificates in the process of asymmetric encryption?
- 508 views
- 1 answers
- 0 votes
I have registered my Gmail Account with 2-step Verification. It sends the code onto my Mobile everytime I want to sign in to my Gmail Account but some strange things are happening to me from past 3 days. I am not Signing-in to my account but still I am getting Gmail 2-step Verification codes on my Mobile. What is the method to resolve this issue?
- 698 views
- 2 answers
- 0 votes
I settled with the digital ocean for a virtual server and SoftEther for the VPN service. Once connected, I have an IP in New York but Google keeps redirecting me to their site in Hong Kong. If I get the VPN disconnected American site as usual. I do not know what happened. I use Mac OS X 10.9 and Firefox 26, if that matters.
- 675 views
- 1 answers
- 0 votes
I would like to could e-mail through Gmail with C, the configured e-mail from a desktop mail client to use a Gmail account to send, send. I looked a bit like jwSMTP popen and sendmail, but those look like they only work if the host is a mail server. I know that this job is a good way to go in Python, but I’ve never tried it in C.
- 685 views
- 1 answers
- 0 votes