Difference between revisions of "Linux Security"

no edit summary
imported>Tele
imported>Tele
Line 139: Line 139:
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method.
* They can be used to encrypt messages in asynchronous encryption. In theory, a thief can steal the key message and steal private and will not be able to decrypt the message. Therefore, this method is considered the most secure method.
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file.
* Keys are used to sign the files, but does not give it a high level of safety. Because you can copy, edit the key from file.


=Understanding processes=
=Understanding processes=
Anonymous user