Ciw Cheat Sheat

Stats

Submitted by:
Date Added: 02 / 10 / 2013
Category: Technology
Words | Pages: 7176 | 29
Views: 209

Similar Essays

Ciw Cheat Sheat

View Full Essay FTP over SSL (S/FTP) provides a more secure mode of file transfer to and from FTP sites. You can also use email protocols (SMTP, POP3, IMAP) over SSL for more secure e-mail.

Intranet — an internal, or in-house, Web site and network used only by employees within a
company. Employees use Web browsers to access files and documents. Security features (such as user names and passwords) prevent the Internet public from accessing a company intranet, but allow employees who use the intranet to access the Internet. An intranet could be described as a mini-Internet within a company.
Extranet — an internal network designed to provide access to selected external users, and is not available to the Internet public. Extranets are an efficient way for business partners to share and exchange information. Customer support tasks can also be performed using an extranet.
For more information about intranets, extranets and the Internet, see Internet Business Associate,
To download files, the FTP client program uses the get command. For instance, after a user logs on to an FTP server, he or she enters the command get filename.ext, depending on the name and extension of the file to be downloaded. However, with most user-friendly FTP client programs, the get command is initiated when the user clicks on the file he or she wants to download. The client automatically uses the get command (invisible to the user) to download the file. The user must then identify the location to which the file should be downloaded.

Secure MIME (S/MIME) is a version of the MIME protocol that provides a secure method of sending e-mail. S/MIME supports encryption (based on the RSA algorithm) and the use of digital certificates in e-mail.
An alternative to S/MIME is Pretty Good Privacy (PGP), a method developed for encrypting and decrypting e-mail messages. PGP uses the public-key encryption system. Each user has a publicly known encryption key, which is used to encrypt messages, and a private key...