Linked by Raymond Lai on Wed 26th Oct 2005 18:49 UTC
Privacy, Security, Encryption Ever since networking came out, one important issue, to a various extent over the time, has been how to give the legitimate users the right access - authentication, which is one of the three basic elements in security: authentication, authorization and access control.
Order by: Score:
I hate to be rude...
by Anonymous on Wed 26th Oct 2005 21:08 UTC
Anonymous
Member since:
---

But having previously read the DeveloperWorks articles by Daniel Robbins and the Gentoo keychain guide, this article doesn't really say anything new.

I suppose it serves some purpose as a summary of those articles, though.

Reply Score: 1

DSA vs RSA
by Anonymous on Wed 26th Oct 2005 21:56 UTC
Anonymous
Member since:
---

Why use DSA over RSA?

Reply Score: 0

Anonymous
Member since:
---

The article is wrong. You should never forward your ssh agent to an untrusted machine. Anyone who has root access on the remote machine can access your agent. Very bad.

Reply Score: 1

Accounting?
by Anonymous on Thu 27th Oct 2005 11:31 UTC
Anonymous
Member since:
---

That third A is usually for accounting, the processes of logging actions (usually authenticated and authorized ones).

Reply Score: 0