FA
Today, Thursday، 26 Dec 2024 - 23:09
Mokhafaf

Acronym Finder

EFT
What is EFT ?
Electronic Funds Transfer
A network of EFT (electronic transfer asset) for the transfer of funds from one account to another account, rather than the use of a medium of paper, such as checks of the electronic equipment of interest....
SWF
What is SWF ?
Shock Wave Flash
Files with extension SWF which stands for ShockWave Flash is usually with the extension .swf known are and by software Flash Player are applicable. Can be them to out executive with the extension .exe and also conversion; and with on Windows they run.

technology flash by company Macromedia (Macromedia) in the world, founded, was bought of Macromedia by Adobe (Adobe) with the trademark Adobe is introduced....
GIS
What is GIS ?
Geographic Information Systems
System of geographic information or geographic information system or GIS is a computer system for management and analysis of geographic information is the ability collect, store, analyze, and display geographic information (location).

the ultimate goal of a geographic information system should support the direction of the decision, the base rate based on locational data, and its basic function obtain information that combining layers of different data in different ways and with diverse perspectives get come....
PPTP
What is PPTP ?
Point to Point Tunneling Protocol
Protocol PPTP is an acronym of Point to Point Tunneling Protocol is a form of protocol, peer-to-peer is that for communication the internet is used.
PPTP by Microsoft made up of virtual private networks support. This network, to entities and organizations allow the internet as a secure method to communicate information to use.
PPTP, from hidden storage package encrypted in the warpper, safe, supported through a TCP/IP connection, transfer find....
L2F
What is L2F ?
Layer 2 Forwarding
Protocol L2F by Cisco created. In the protocol model, determining the validity of a user that is PPP support have been used....
IKE
What is IKE ?
Internet Key Exchange
IKE protocol is that several important issue in secure communication sets. Authentication points, such as key exchange, symmetric. This protocol, the Assembly, the security (SA) have created and SAD or base Assembly, Security Association data base ). IKE protocol that generally requires user space is tremendous and the operating system doesn't implement. Protocol, IKE, port number, UDP/500. IKE consists of two stages. The first stage, the same forming Assembly, the Security Key Management (Internet Security Association and key) or (ISAKMP SA). Privacy [edit] to negotiate and set the IPSec SA is used. Authentication the first stage points, such as usually based on keys ago subscription (Per shared Keys ), the arrow keys, RSA certificates X509 arise. The first stage of The support is appreciated. The main mode (main mode) and aggressive mode (aggressive mode) between these two points, such as the authentication and ISAKMP SA will set. In aggressive mode, only half the number of messages in this case are covered. Anyway, this is a bug can be considered, because this mode can not be from the identity of the points, peer support, protect, and from this the direction that this state having advance key shared (PSK) APT attacks among the way (man-in-the-middle) would be. On the other side, the only purpose of the offensive is the same. In the main mode, not key preconditions different can't support points, peer-to-peer will also not recognize. In aggressive mode, that of protecting the identity of individuals / support points does not, and the identity of the users of the endpoints of such a transparent transfer. So points such as every thing will know before the authentication of the identity about the fit and the keys to the preconditions be applied. In the second stage of the protocol, IKE, is SA, the proposed exchange are and the agreement on the base ISAKMP SA for SA will be done. ISAKMP SA authentication for the protection of the bronchi, between the way the preparation of The sees. The second step of the quick mode uses. Usually two points, such as the SAKMP SA together, negotiate and agree that both sides are usually on several negotiation (at least 2) indirectly, agreed....
WAN
What is WAN ?
Wide Area Network
Wan a computer network that the geographic relatively large range it covers (for example, from one country to another country or from one continent to another continent). This network is usually from a transmission facilities providers such as telecommunication firms. Words, a less official, this network of and communication link, they use....
L2TP
What is L2TP ?
Layer 2 Tunneling Protocol
Tunneling Protocol layer 2. Tunneling Protocol is on computer networks to support virtual private network (VPN) goes to work. In this way, no encryption or security is your protocol doesn't provide, but LT2P to create privacy relies on the protocol encryption inside the tunnel that passes through it.

although there is LT2P operates in Kurdish the same protocol layer in the OSI model. but in fact, a layer protocol of the meeting and from the port, UDP registered 1701 uses....