Search
All categories
Results 41 - 61 of about 348
  • How to Structure an Email?

    Nowadays, we send emails almost everyday. They have become one of the most convenient ways to communicate with colleagues, friends and family living far away. If you’d like to explore how the email is structured, read this article and... Read more

    Email
    January 25, 2021 at 12:23 PM
  • Architecture of powerline communication (PLC) devices

    Indoor architecture Homeplug is the PLC solution in commercial use today for indoor installations, these are ideal for extending a local area network and sharing existing broadband Internet access, mainly for domestic or small business... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • PLC technologies

    Transmission channel The electrical supply network cabling was not tested to see if it could transport high frequency (HF) signals. One must therefore consider the constraints of this medium to ensure good transmission of HF signals... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • Certificates

    Introduction to the concept of certificates Asymmetric encryption algorithms are based on the sharing of a public key among various users. In general, this key is shared via an electronic directory (usually in LDAP format) or a website.... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Private-key (or Secret-key) Cryptography

    Private-key encryption (also called symmetric encryption or secret-key encryption) involves using the same key for encryption and decryption. Encryption involves applying an operation (an algorithm) to the data to be encrypted using the... Read more

    Cryptography
    February 3, 2021 at 03:53 AM
  • Cryptography laws

    the issue of legislation There are Internet laws, but these are often inadequate and each country has its own legislation - so much so that just a few years ago, France prohibited all forms of encryption (except for signatures since... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Cryptography

    Why cryptography? Mankind has always felt a need to disguise information, even long before the first computers and calculating machines existed. Since it was created, the Internet has evolved to such a point that it has become an... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Introduction to Encryption with DES

    On May 15, 1973, the National Bureau of Standards (NBS, now called NIST for National Institute of Standards and Technology) published a request in the Federal Register for an encryption algorithm that would meet the following criteria:... Read more

    Cryptography
    January 22, 2021 at 11:43 AM
  • Cryptography - Enigma

    "Never blindly trust a cryptography system" - Gilles Dubertret The history of Enigma The need to encrypt messages appeared at the end of World War I (although encryption techniques had already existed for a long time). It was a Dutchman... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Encryption with RSA

    the RSA system The first public-key encryption (asymmetric encryption) algorithm was developed by R.Merckle and M.Hellman in 1977. It was quickly made obsolete thanks to the work of Shamir, Zippel and Herlestman, famous cryptanalysts.... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Transposition ciphers

    Transposition encryption methods involve rearranging data to be encrypted to make them incomprehensible. This may mean, for example, geometrically re-ordering data to make them visually unusable. The Assyrian technique The Assyrian... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • The Vigenère cipher

    The Vigenère cipher The Vigenère cipher is a symmetric cryptosystem, which means it uses the same key for encryption and decryption. The Vigenère cipher closely resembles the Caesar cipher, with the exception that it uses a longer key... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Networking: 3-Tier Client/Server Architecture

    In client/server systems, there are several types of configurations. This article will get into detail of the client server architecture and more precisely, 2-tier architecture and 3-tier architecture. We also explain the differences... Read more

    Client/Server
    January 25, 2021 at 04:21 AM
  • Client/Server Environment

    What is a client server environment ? Numerous applications run in a client server architecture. This means that client computers (computers forming part of the network) contact a server that provides services to the client computers.... Read more

    Client/Server
    January 13, 2021 at 09:38 AM
  • CSS - Style sheets

    Introduction to style sheets The concept of style sheets first appeared in 1996 when the W3C published a new recommendation entitled "Cascading Style Sheets", or CSS for short. The principle behind style sheets involves using a single... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Positioning elements in CSS

    Using style sheets along with the and tags, you can specify the location of text or images down to the pixel. This is possible with versions 4 and higher of Netscape and Internet Explorer; however, the technique is still problematic and... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Style syntax (CSS)

    Defining a style Defining a style is done using simple text rules for describing the aspects of page elements. A CSS rule is characterised by two main elements: A type selector, for specifying which tags in the document the style... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Operating Systems - MS-DOS - Commands

    MS-DOS (Microsoft Disk Operating System) is an OS for x86-based personal computers. After having been the head OS for IBM PC compatible computers in the 1980s, it was gradually replaced by operating systems with a graphical user... Read more

    MS Dos
    January 18, 2021 at 12:00 PM
  • MS DOS Files And Directories

    When it comes to computers, data is stored in files. When you run a program, MS-DOS processes the data stored in the file and passes it to the system. In MS-DOS a file can be any size, however the file name is more restricted, it can... Read more

    MS Dos
    January 20, 2021 at 04:16 AM
  • BNC connector

    BNC connector BNC connectors (Bayonet-Neill-Concelman or British Naval Connector) are connectors for coaxial cables. The BNC family is made up of the following elements: BNC cable connector: is either soldered or crimped to the end of... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM

Subscribe To Our Newsletter!

The Best of CCM in Your Inbox

Subscribe To Our Newsletter!