Перевод: с русского на английский

с английского на русский

crypto tunnels

См. также в других словарях:

  • Station CAST — was the United States Navy signals monitoring and cryptographicintelligence unit at Cavite Navy Yard in the Philippines, until Cavite was captured by the Japanese forces in 1942, during World War II. It was an important part of the Allied… …   Wikipedia

  • Dynamic Multipoint Virtual Private Network — Dieser Artikel wurde aufgrund von inhaltlichen Mängeln auf der Qualitätssicherungsseite der Redaktion Informatik eingetragen. Dies geschieht, um die Qualität der Artikel aus dem Themengebiet Informatik auf ein akzeptables Niveau zu bringen. Hilf… …   Deutsch Wikipedia

  • Hamachi — Infobox Software name = Hamachi caption = Screenshot of Hamachi developer = LogMeIn Inc. latest release version = 1.0.3.0 latest release date = Aug 18, 2008 operating system = Microsoft Windows, Linux, Mac OS X genre = P2P, VPN | license =… …   Wikipedia

  • Tunnel (Rechnernetz) — Tunnel bzw. Tunneling bezeichnet in einem Netzwerk die Konvertierung und Übertragung eines Kommunikationsprotokolls, das für den Transport in ein anderes Kommunikationsprotokoll eingebettet wird. Vor und hinter den Tunnelpartnern wird somit das… …   Deutsch Wikipedia

  • I2P — Infobox Software name = I2P logo= caption = developer = I2P developers latest release version = 0.6.4 latest release date = release date|2008|10|6 operating system = Cross platform genre = Overlay network license = Free/Open Source… …   Wikipedia

  • Knoppix STD — (Security Tools Distribution) is a Live CD Linux distribution based on Knoppix that focuses on computer security tools. It includes GPL licensed tools in the following categories: authentication, password cracking, encryption, forensics,… …   Wikipedia

  • Dynamic Multipoint Virtual Private Network — A Dynamic Multipoint Virtual Private Network is an enhancement of the virtual private network (VPN) configuration process of Cisco IOS based routers. DMVPN prevents the need for pre configured (static) IPsec (Internet Protocol Security) peers in… …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • Endolith — lifeform found inside an Antarctic rock An endolith is an organism (archaeum, bacterium, fungus, lichen, alga or amoeba) that lives inside rock, coral, animal shells, or in the pores between mineral grains of a rock. Many are extremophiles,… …   Wikipedia

  • Procfs — On many Unix like computer systems, procfs, short for process file system, consists of a pseudo file system (a file system dynamically generated at boot) used to access process information from the kernel. The file system is often mounted at the… …   Wikipedia

  • Telecommunications data retention — In the field of telecommunications, data retention (or data preservation) generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data (IPDRs) by governments and commercial organisations. In …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»