羊皮纸论坛

羊皮纸论坛

分享让知识传播,阅读让心灵成长, 创作让文化传承,让我们共同努力。
  • 禁止广告文
  • 知识传播
  • 阅读
  • 心灵成长
  • 创作
  • 文化传承
羊皮纸论坛目录 / 网际网路 / 网路服务 /

Encryption of actions

发表新主题
随机主题
上个主题
下个主题
|
Encryption of actions

Encryption of actions
1. Social networks-originally conceived as a means for the widest possible communication. However, not every modern user wants the entire Internet to broadcast their actions from the VC, for example. Scrambls-browser extension to help users, thanks to which you can encrypt individual messages. Works on most browsers and operating systems, but requires registration on the site. Optionally encrypts messages for all, or allows you to see the original text only a certain group of people.

2. Chats are weakly protected platforms for instant messaging. Public chats are extremely vulnerable and are a favorite place for intruders. Any security expert on the Internet will say that the use of open chats will sooner or later lead to at least a PC infection or loss of personal data. To prevent this from happening, you should use special plugins with which you can create encrypted anonymous chats, access to which will be only a certain circle of persons. Cryptocat is one of these extensions available for Google Chrome and Firefox. It does not require registration and allows you to create an anonymous chat for 10 people protected by a 256-bit key, which can be accessed only with the help of an automatically generated code word. Does not store logs longer than 30 minutes from the last activity, but does not hide the real IP address, which implies a connection to a VPN or work through THE tor browser.

  • 本文由作者宣告为原创文章, 为尊重著作权, 未经作者同意请勿任意转载
  • 关键字 : which, chats, registration, protected, people, messages, create, certain, browser, anonymous, allows, actions, Internet, widest, weakly, wants, vulnerable, users, through, these
0 0
2019-11-14T22:47:03+0000

Mafmana :

If you know that your data is subject to constant threats while surfing the network, then you should use the services of a VPN service. When you are directly connected to the Internet, your data is transferred over an insecure network which is very easy to crack. Not only hackers threaten the security of your data. Your ISP can track all the data that you send or receive over the Internet.
0 0
2019-11-15T10:25:42+0000

Nika56 :

Although data is transferred to a VPN over networks with a low level of trust, using cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption TopVPN, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connections: network-to-network, node-to-network and node-to-node.
0 0
2019-11-15T13:42:59+0000

chola :

It is interesting here to learn for what purposes you use VPN, what prefer to use? As you know there are VPN free and paid. And know than they differ between themselves? Of course that would visit blocked sites, it is suitable and free VPN, but where is the guarantee that you will be safe? I here personally prefer paid VPN, as here 翻墙 so I know for sure that everything will be fine. And the speed of work compared to free, it is significantly different. Fast, reliable and comfortable. No one knows where I am. All sites are open. What do you think? Or do you know the best VPN?
0 0
2019-11-15T14:46:35+0000

Mafmana :

Habituellement, vous vous connectez au réseau via le fournisseur de services approprié, un fournisseur de services Internet. Votre fournisseur vous connecte à n’importe quel site que vous voulez visiter. Tout votre trafic Internet passe par les serveurs du fournisseur, ce qui signifie que le fournisseur peut le visualiser. Lorsque vous utilisez VPN TopVPN, vous vous connectez au serveur VPN via un tunnel crypté de manière sécurisée. Cela signifie que toutes les données que vous échangez avec ce serveur VPN ne peuvent être déchiffrées que par ce serveur et votre ordinateur.
0 0
2019-11-15T20:29:12+0000

Mafmana :

Your Internet connection via VPN will be encrypted. There are three main types of encryption: hashing symmetric and asymmetric encryption. Each type has its own advantages and disadvantages, but all of them encrypt your data so that they will be useless in the wrong hands.
0 0
2019-11-26T19:09:06+0000


  • 当您未登入羊皮纸时,可以利用脸书 Facebook 登入来发表回响。若使用羊皮纸会员身份发表回响则可获得经验值及虚拟金币,用来参加羊皮纸推出的活动。
发表回响
 
验证字串