Difference between revisions of "Linux Security"
no edit summary
imported>Tele |
imported>Tele |
||
Line 139: | Line 139: | ||
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method. | * They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method. | ||
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file. | * Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file. | ||
=Understanding processes= | =Understanding processes= |