羊皮紙論壇

羊皮紙論壇

分享讓知識傳播,閱讀讓心靈成長, 創作讓文化傳承,讓我們共同努力。
  • 禁止廣告文
  • 知識傳播
  • 閱讀
  • 心靈成長
  • 創作
  • 文化傳承
羊皮紙論壇目錄 / 網際網路 / 網路服務 /

Encryption of actions

發表新主題
隨機主題
上個主題
下個主題
|
Encryption of actions

Encryption of actions
1. Social networks-originally conceived as a means for the widest possible communication. However, not every modern user wants the entire Internet to broadcast their actions from the VC, for example. Scrambls-browser extension to help users, thanks to which you can encrypt individual messages. Works on most browsers and operating systems, but requires registration on the site. Optionally encrypts messages for all, or allows you to see the original text only a certain group of people.

2. Chats are weakly protected platforms for instant messaging. Public chats are extremely vulnerable and are a favorite place for intruders. Any security expert on the Internet will say that the use of open chats will sooner or later lead to at least a PC infection or loss of personal data. To prevent this from happening, you should use special plugins with which you can create encrypted anonymous chats, access to which will be only a certain circle of persons. Cryptocat is one of these extensions available for Google Chrome and Firefox. It does not require registration and allows you to create an anonymous chat for 10 people protected by a 256-bit key, which can be accessed only with the help of an automatically generated code word. Does not store logs longer than 30 minutes from the last activity, but does not hide the real IP address, which implies a connection to a VPN or work through THE tor browser.

  • 本文由作者宣告為原創文章, 為尊重著作權, 未經作者同意請勿任意轉載
  • 關鍵字 : which, chats, registration, protected, people, messages, create, certain, browser, anonymous, allows, actions, Internet, widest, weakly, wants, vulnerable, users, through, these
0 0
2019-11-14T22:47:03+0000

Mafmana :

If you know that your data is subject to constant threats while surfing the network, then you should use the services of a VPN service. When you are directly connected to the Internet, your data is transferred over an insecure network which is very easy to crack. Not only hackers threaten the security of your data. Your ISP can track all the data that you send or receive over the Internet.
0 0
2019-11-15T10:25:42+0000

Nika56 :

Although data is transferred to a VPN over networks with a low level of trust, using cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption TopVPN, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connections: network-to-network, node-to-network and node-to-node.
0 0
2019-11-15T13:42:59+0000

chola :

It is interesting here to learn for what purposes you use VPN, what prefer to use? As you know there are VPN free and paid. And know than they differ between themselves? Of course that would visit blocked sites, it is suitable and free VPN, but where is the guarantee that you will be safe? I here personally prefer paid VPN, as here 翻牆 so I know for sure that everything will be fine. And the speed of work compared to free, it is significantly different. Fast, reliable and comfortable. No one knows where I am. All sites are open. What do you think? Or do you know the best VPN?
0 0
2019-11-15T14:46:35+0000

Mafmana :

Habituellement, vous vous connectez au réseau via le fournisseur de services approprié, un fournisseur de services Internet. Votre fournisseur vous connecte à n’importe quel site que vous voulez visiter. Tout votre trafic Internet passe par les serveurs du fournisseur, ce qui signifie que le fournisseur peut le visualiser. Lorsque vous utilisez VPN TopVPN, vous vous connectez au serveur VPN via un tunnel crypté de manière sécurisée. Cela signifie que toutes les données que vous échangez avec ce serveur VPN ne peuvent être déchiffrées que par ce serveur et votre ordinateur.
0 0
2019-11-15T20:29:12+0000

Mafmana :

Your Internet connection via VPN will be encrypted. There are three main types of encryption: hashing symmetric and asymmetric encryption. Each type has its own advantages and disadvantages, but all of them encrypt your data so that they will be useless in the wrong hands.
0 0
2019-11-26T19:09:06+0000


  • 當您未登入羊皮紙時,可以利用臉書 Facebook 登入來發表迴響。若使用羊皮紙會員身份發表迴響則可獲得經驗值及虛擬金幣,用來參加羊皮紙推出的活動。
發表迴響
 
驗證字串