Tags » RSA

Cryptography: Old vs New

There are things that we want to tell somebody else, but not everybody, so you write the message in a special way that only the intended recipients can know its actual meaning. 1,307 more words

Asymmetric Key

India sees 54% of total phishing volume in APAC in 2013, says RSA report

 

RSA, the security division of EMC has revealed the Fraud report 2013. As per the report, India has emerged as the top nation in the APAC region in terms of phishing attack by volume closely followed by Australia and China. 126 more words

Technology

RSA Animate: The Power of Outrospection

We Need More Empathy

In this RSA Animate video, philosopher and author Roman Krznaric speaks on a much needed social change that will allow us a human race to bring a better way of living across the planet. 324 more words

Think Tank

JIT DYNAMIC CRYPTOSYSTEM

Conventional cryptography systems use a static key or a pair of keys for the encryption and decryption process. It is known from the study of the authentication method that the dynamic 2-factor based methods are more secure than the static parameter based authentication method. 237 more words

I want to be famous for not being famous – RSA

How to use RSA keys for login to remote machines using SSH without Passwords on Ubuntu.

Hello Guyz… :).. Today In this tutorial I’m going to manage the remote Ubuntu/Linux machines via SSH key pairs. First of all let’s assume there are two Ubuntu servers are available, those are called QA-Server and PP-Server. 309 more words

Ubuntu

Water Damage Mobile, AL

The RSA tower is very large! In fact, it is the largest building in the state of…
http://bit.ly/1jQq22r