-
1 crypto tunnels
Компьютерная техника: крипто-туннели
См. также в других словарях:
Station CAST — was the United States Navy signals monitoring and cryptographicintelligence unit at Cavite Navy Yard in the Philippines, until Cavite was captured by the Japanese forces in 1942, during World War II. It was an important part of the Allied… … Wikipedia
Dynamic Multipoint Virtual Private Network — Dieser Artikel wurde aufgrund von inhaltlichen Mängeln auf der Qualitätssicherungsseite der Redaktion Informatik eingetragen. Dies geschieht, um die Qualität der Artikel aus dem Themengebiet Informatik auf ein akzeptables Niveau zu bringen. Hilf… … Deutsch Wikipedia
Hamachi — Infobox Software name = Hamachi caption = Screenshot of Hamachi developer = LogMeIn Inc. latest release version = 1.0.3.0 latest release date = Aug 18, 2008 operating system = Microsoft Windows, Linux, Mac OS X genre = P2P, VPN | license =… … Wikipedia
Tunnel (Rechnernetz) — Tunnel bzw. Tunneling bezeichnet in einem Netzwerk die Konvertierung und Übertragung eines Kommunikationsprotokolls, das für den Transport in ein anderes Kommunikationsprotokoll eingebettet wird. Vor und hinter den Tunnelpartnern wird somit das… … Deutsch Wikipedia
I2P — Infobox Software name = I2P logo= caption = developer = I2P developers latest release version = 0.6.4 latest release date = release date|2008|10|6 operating system = Cross platform genre = Overlay network license = Free/Open Source… … Wikipedia
Knoppix STD — (Security Tools Distribution) is a Live CD Linux distribution based on Knoppix that focuses on computer security tools. It includes GPL licensed tools in the following categories: authentication, password cracking, encryption, forensics,… … Wikipedia
Dynamic Multipoint Virtual Private Network — A Dynamic Multipoint Virtual Private Network is an enhancement of the virtual private network (VPN) configuration process of Cisco IOS based routers. DMVPN prevents the need for pre configured (static) IPsec (Internet Protocol Security) peers in… … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Endolith — lifeform found inside an Antarctic rock An endolith is an organism (archaeum, bacterium, fungus, lichen, alga or amoeba) that lives inside rock, coral, animal shells, or in the pores between mineral grains of a rock. Many are extremophiles,… … Wikipedia
Procfs — On many Unix like computer systems, procfs, short for process file system, consists of a pseudo file system (a file system dynamically generated at boot) used to access process information from the kernel. The file system is often mounted at the… … Wikipedia
Telecommunications data retention — In the field of telecommunications, data retention (or data preservation) generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organisations. In … Wikipedia