How to maximize persuasiveness over the network

Teams that consist of people from different physical areas are on the rise.  As technology help organization extend geologically and promote working from home, working with others over the network is becoming the norm. The new generation can deal with…

Digital certificate basics

Digital certificate is an electronic credential that is required by public key infrastructure (PKI) systems that can securely identify an individual as well as create an association between the individuals authenticated identity and public key.  Certificate authority (CA) is a…

Implementing encryption protocols

WEP, which stands for wireless encryption protocol, provides encrypted communication between wireless clients and access points.  WEP uses key encryption algorithm to encrypt messages between devices.  Each client and access point on the wireless LAN must use the same encryption key.  The…

Types of asymmetric encryption algorithms

On my last post, I’ve talked about the types of symmetric encryption algorithms.  Today, I’ll be covering different types of asymmetric encryption algorithms. RSA is one of the most popular asymmetric public key algorithms because it was technically the first…

Types of symmetric encryption algorithms

Let’s talk about the types of symmetric encryption algorithms.  You can read about how symmetric encryption works by clicking here.  The types of symmetric encryption algorithms I want to cover today are DES, 3DES, AES, Blowfish, twofish, IDEA, and RC4.  Basically…