trivial password

  • 11SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms …

    Wikipedia

  • 12List of American game shows — The following is a list of game shows that air in the United States. Presently airing shows are in bold type. Dating * 12 Corazones (2004 present) * A Shot at Love with Tila Tequila (2007 present) * Age of Love (2007 present) * Average Joe (2003… …

    Wikipedia

  • 13File Transfer Protocol — (FTP) is a network protocol used to transfer data from one computer to another through a network such as the Internet.FTP is a file transfer protocol for exchanging and manipulating files over a TCP computer network. A FTP client may connect to a …

    Wikipedia

  • 14Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …

    Wikipedia

  • 15Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …

    Wikipedia

  • 16Zero-knowledge proof — In cryptography, a zero knowledge proof or zero knowledge protocol is an interactive method for one party to prove to another that a (usually mathematical) statement is true, without revealing anything other than the veracity of the statement.A… …

    Wikipedia

  • 17Private biometrics — A form of biometrics in which the prover is protected against the misuse of template data by a dishonest verifier.Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population …

    Wikipedia

  • 18Quantum computer — A quantum computer is a device for computation that makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. In a classical (or conventional) computer, information is… …

    Wikipedia

  • 19Secret sharing — refers to any method for distributing a secret amongst a group of participants, each of which is allocated a share of the secret. The secret can only be reconstructed when the shares are combined together; individual shares are of no use on their …

    Wikipedia

  • 20Wireless LAN security — One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this… …

    Wikipedia