Manjaro Difference between revisions of "Linux Security"

Difference between revisions of "Linux Security"

From Manjaro
imported>Tele
imported>Tele
Line 139: Line 139:
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method.
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method.
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file.
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file.


=Understanding processes=
=Understanding processes=
Cookies help us deliver our services. By using our services, you agree to our use of cookies.