FA
Today, Friday، 22 Nov 2024 - 22:09
Mokhafaf

Acronym Finder

IKE
What is IKE ?
Internet Key Exchange
IKE protocol is that several important issue in secure communication sets. Authentication points, such as key exchange, symmetric. This protocol, the Assembly, the security (SA) have created and SAD or base Assembly, Security Association data base ). IKE protocol that generally requires user space is tremendous and the operating system doesn't implement. Protocol, IKE, port number, UDP/500. IKE consists of two stages. The first stage, the same forming Assembly, the Security Key Management (Internet Security Association and key) or (ISAKMP SA). Privacy [edit] to negotiate and set the IPSec SA is used. Authentication the first stage points, such as usually based on keys ago subscription (Per shared Keys ), the arrow keys, RSA certificates X509 arise. The first stage of The support is appreciated. The main mode (main mode) and aggressive mode (aggressive mode) between these two points, such as the authentication and ISAKMP SA will set. In aggressive mode, only half the number of messages in this case are covered. Anyway, this is a bug can be considered, because this mode can not be from the identity of the points, peer support, protect, and from this the direction that this state having advance key shared (PSK) APT attacks among the way (man-in-the-middle) would be. On the other side, the only purpose of the offensive is the same. In the main mode, not key preconditions different can't support points, peer-to-peer will also not recognize. In aggressive mode, that of protecting the identity of individuals / support points does not, and the identity of the users of the endpoints of such a transparent transfer. So points such as every thing will know before the authentication of the identity about the fit and the keys to the preconditions be applied. In the second stage of the protocol, IKE, is SA, the proposed exchange are and the agreement on the base ISAKMP SA for SA will be done. ISAKMP SA authentication for the protection of the bronchi, between the way the preparation of The sees. The second step of the quick mode uses. Usually two points, such as the SAKMP SA together, negotiate and agree that both sides are usually on several negotiation (at least 2) indirectly, agreed....
WAN
What is WAN ?
Wide Area Network
Wan a computer network that the geographic relatively large range it covers (for example, from one country to another country or from one continent to another continent). This network is usually from a transmission facilities providers such as telecommunication firms. Words, a less official, this network of and communication link, they use....
L2TP
What is L2TP ?
Layer 2 Tunneling Protocol
Tunneling Protocol layer 2. Tunneling Protocol is on computer networks to support virtual private network (VPN) goes to work. In this way, no encryption or security is your protocol doesn't provide, but LT2P to create privacy relies on the protocol encryption inside the tunnel that passes through it.

although there is LT2P operates in Kurdish the same protocol layer in the OSI model. but in fact, a layer protocol of the meeting and from the port, UDP registered 1701 uses....
SSTP
What is SSTP ?
Secure Socket Tunneling Protocol
SSTP is one of the methods to implement VPN, which is the ability to transfer the protocols PPP and L2TP, with the use of SSL encryption version 3.0 capable so the highest security in the ways VPN has additionally, with the use of SSL on Port 443 of the TCP can be from almost any Pro-xy and easily pass. This method limits ... connect models SSTP in Windows older than Windows Vista SP1 implementation of not, and, in addition, it for using SSL quickly communicate and exchange information in this manner, especially with a limited band width, traffic, user, a significant drop can't find....
AFS
What is AFS ?
Andrew File System
AFS is a file system distributed to the ease of acquiring files remotely on the network. AFS belongs to the company Transarc. In the beginning, as part of the project Andrew in the center of Information Technology at the University of Carrnegie-Mellon was produced....
ASF
What is ASF ?
Advanced Systems Format
The format of the advanced (ASF) is a file format extensible is that, in order for a service and broadcast disciplines (streams) digital synchronous (synchronized), and transferring them in a network of computer etc. design. ASF includes The for content-based audio media of Windows (Windows Media Audio) and video media Windows (Windows Media Video). The extension WMA or WMV to specify a file, ASF will be used in such a manner that this file contains the contents of the code by the code manufacturer (coder) of the MWA and WMV. The format SDK is format media be to create and read files of media Windows used and as files of ASF include other types of , compressed, or compaction Walmart (uncompressed Data), as an example....
APM
What is APM ?
Advanced Power Management
Interface program storage functional (API), which is Microsoft and Intel provided the power consumption of personal computers, and especially computers batteries. comments.
so to program, the possibility is given, in relation to the needs of the power consumption with the system, communicate system and also grasping electrical components hard that are not used to cut....
ATM
What is ATM ?
Adobe Type Manager
Software from Adobe System, which manages fonts, Post Script in a system is responsible....