Ciw Cheat Sheat

Topics: HTML, XHTML, Web page Pages: 24 (7176 words) Published: February 10, 2013
FTP over SSL (S/FTP) provides a more secure mode of file transfer to and from FTP sites. You can also use email protocols (SMTP, POP3, IMAP) over SSL for more secure e-mail.

Intranet — an internal, or in-house, Web site and network used only by employees within a company. Employees use Web browsers to access files and documents. Security features (such as user names and passwords) prevent the Internet public from accessing a company intranet, but allow employees who use the intranet to access the Internet. An intranet could be described as a mini-Internet within a company. Extranet — an internal network designed to provide access to selected external users, and is not available to the Internet public. Extranets are an efficient way for business partners to share and exchange information. Customer support tasks can also be performed using an extranet. For more information about intranets, extranets and the Internet, see Internet Business Associate, To download files, the FTP client program uses the get command. For instance, after a user logs on to an FTP server, he or she enters the command get filename.ext, depending on the name and extension of the file to be downloaded. However, with most user-friendly FTP client programs, the get command is initiated when the user clicks on the file he or she wants to download. The client automatically uses the get command (invisible to the user) to download the file. The user must then identify the location to which the file should be downloaded.

Secure MIME (S/MIME) is a version of the MIME protocol that provides a secure method of sending e-mail. S/MIME supports encryption (based on the RSA algorithm) and the use of digital certificates in e-mail. An alternative to S/MIME is Pretty Good Privacy (PGP), a method developed for encrypting and decrypting e-mail messages. PGP uses the public-key encryption system. Each user has a publicly known encryption key, which is used to encrypt messages, and a private key (known only to that user), which is used to decrypt messages. Gnu Privacy Guard (GPG), also known as GnuPG, is an open-source version of PGP that does not use patented algorithms.

An IMAP server receives and holds your messages. When you log on with your user name and password, you can read a message on the server, or you can view just the heading and the sender of the message and decide whether to download it. Messages are not downloaded automatically as they are with a POP3 server.

SSH Utility Description
Secure Shell (SSH) Provides secure logon and authentication. Allows you to obtain a logon shell and execute commands on the server, assuming you have permissions to execute these commands. Also known as "slogin," which is short for secure login. Secure Copy (SCP) Provides a secure method of copying files between systems. SCP sessions are usually non-interactive; that is, you generally do not list files and issue other commands, as you would with SSH.

SSH File Transfer Protocol
An interactive client that works much like standard FTP, but is encrypted. 1.9.2: Cookies
Cookies are small text files placed on Web site visitors' computers so Web site managers can customize their sites to their visitors' preferences. For example, a cookie might be used to store information about your actions, such as the options you clicked on the Web page.

(private key)
The same key is used to encrypt and decrypt a message. The message sender uses a key (generated by an encryption application) to encrypt the message; the sender forwards a copy of the key to the message recipient, who uses the same key to decrypt the message. Asymmetric

(public key)
Two keys are used to encrypt and decrypt a message: a private key and a public key. The public key is known to all sending and receiving parties involved in the communication. The private key is used by the recipient to decrypt the message. Therefore, the private key must be kept secret. The sending and receiving...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cheats Essay
  • Cheat in Climatechange Essay
  • Essay about cheat sheet
  • cheat sheet Essay
  • Cheat Sheet Essay
  • Essay on cheat sheet
  • Cheat Sheet Essay
  • JNCIA Commands: Cheat Sheet Essay

Become a StudyMode Member

Sign Up - It's Free