-
1 Wi-Fi Protected Access
A security method used by wireless networks. WPA encrypts the information that is sent between computers on a wireless network and authenticates users to help ensure that only authorized people can access the network. -
2 push-button configuration
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
3 PBC
"In some Wi-Fi Protected Setup networks, a method that enables users to push a physical or software-based button to automatically configure network names, connect devices to the network, and enable data encryption and authentication." -
4 SRK
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
5 storage root key
"On a system that incorporates a TPM, a cryptographic asymmetric key which is created at the root of the TPM key hierarchy (2048-bit RSA key) and which is used by the TPM to store protected data. The private portion of this key never leaves the TPM. The public part of this key is returned to the owner and needs to be carefully guarded since it uniquely identifies the TPM on the network, therefore is privacy sensitive." -
6 homegroup
"A group of computers on a home network that can share pictures, music, videos, documents, and printers. A homegroup is created by using the HomeGroup feature; it is protected with a password."
См. также в других словарях:
Network cloaking — is a technology that makes a protected network invisible to malicious external traffic, while allowing complete and uninterrupted access for legitimate users. Network cloaking is accomplished via a promiscuous bridge with firewall functionality,… … Wikipedia
Protected areas in Canada — Protected areas of Canada have been created to protect ecological integrity, as well as to provide areas for recreation and education. Most of the protected areas in Canada are terrestrial; however, there has been a growing focus to also protect… … Wikipedia
Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer … Wikipedia
Network Security & Cryptography — is a concept to protect our network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Data Security is a challenging issue of data communications today that touches… … Wikipedia
Network Automation — Type Private Founded Los Angeles, CA (2004) Headquarters … Wikipedia
Network transparency — in its most general sense refers to the ability of a protocol to transmit data over the network in a manner which is transparent (invisible) to those using the applications that are using the protocol. The term is often applied in the context of… … Wikipedia
Protected areas of West Bengal — cover 4% of the state area.cite web url = http://www.indiainbusiness.nic.in/indian states/westbengal/General.htm title = West Bengal: General Information accessdate = 2006 08 25 work = India in Business publisher = Federation of Indian Chambers… … Wikipedia
Protected areas of Croatia — The main protected areas of Croatia are national parks, nature parks and strict reserves. There are 444 protected areas of Croatia, encompassing 9% of the country. Those include 8 national parks in Croatia, 2 strict reserves and 10 nature parks.… … Wikipedia
Protected areas of Portugal — The protected areas of Portugal include one national park, 13 natural parks, nine natural reserves, seven protected landscapes, five natural monuments, seven classified places and two specially designated areas. Two extensive areas of Portugal… … Wikipedia
Protected area — Natural park redirects here. For specific use in Spain, see Natural park (Spain). This article is about protected regions of environmental or cultural value. For protected area of a cricket pitch, see Cricket pitch. Protected areas are locations… … Wikipedia
Network packet — In computer networking, a packet is a formatted unit of data carried by a packet mode computer network. Computer communications links that do not support packets, such as traditional point to point telecommunications links, simply transmit data… … Wikipedia