Posts
 
Reputation
Joined
Last Seen
Ranked #4K
Strength to Increase Rep
+0
Strength to Decrease Rep
-0
100% Quality Score
Upvotes Received
1
Posts with Upvotes
1
Upvoting Members
1
Downvotes Received
0
Posts with Downvotes
0
Downvoting Members
0
1 Commented Post
0 Endorsements
~1K People Reached
Favorite Forums

4 Posted Topics

Member Avatar for kaleem_sysnet

Hi, Network Sec occurs at all TCP/IP layers ie Physical layer security will deal with cable shielding, quantum cryptography, burglar proofing,CCTV, Proxy card and Biometric door access control systems, all in the name of protecting the physical network infrasructure. The Data link and MAC layers will deal with security at …

Member Avatar for kawalya
0
180
Member Avatar for Aisha25

Hello, i have a different view of the problem you are solving. If it be that you are looking at a financial computation of the sort as how much money would have accumulated over a period, given monthly deposits of 100 dollars at a given annual interest rate i which …

Member Avatar for kvass
-1
823
Member Avatar for schrd

Hi, could you please provide some more info on that, eg code snippets. Thanks [QUOTE=schrd;1120756]hello,I am doing project on key management scheme for secure broadcasting in Java.It needs hierarchy of classes similar to e-subscription of newspaper and pay-tv systems.I've done it using three classes like 1.Read,write and download 2. Read …

Member Avatar for kawalya
0
102
Member Avatar for kawalya

Hi folks, i need some help on how to get this code to work properly: I have not had the time to fully commit to its intrinsics but i am sure there is someone in the community who can get me some quick help. Thanx.[code]package javaapplication1; import java.io.ByteArrayOutputStream; import javax.crypto.Cipher; …

0
113

The End.