123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL >> Technology,-Gadget-and-Science

Archived Articles about Technology, Gadget and Science

Page: << <    1571  1572 [1573]  1574  1575  1576    > >>

Know Your Memory Stick    By: BrianWoodluck
Generally, memory Stick is known as a removable flash memory card format which was introduced by Sony company in 1998.(read entire article)(posted on: 2010-04-21)
View : 64 Times

Introduction To Memory Card Reader    By: BrianWoodluck
Memory card reader is such a device which contains usb interface which helps in accessing the data on memory card such as compact flash, secure digital and multimedia card.(read entire article)(posted on: 2010-04-21)
View : 75 Times

Choosing The Right Sd Card    By: BrianWoodluck
Its always required that the buyer should be knowledgeable for dealing with types of cards coming up in the market.(read entire article)(posted on: 2010-04-21)
View : 60 Times

Samsung Luxia Lcd Line Television    By: Yasin Resif
Samsung has divided the Luxia series into 3 sequence, every with distinct specifications. The 6000 string represents the entry-level types, the 7000 line is the most well-rounded, along with the 8000 has a few minor tweaks meant to appeal to videophiles and enthusiasts.(read entire article)(posted on: 2010-04-21)
View : 129 Times

The Monotonous Male Sound May Be More Attractive    By: TonyEva
A U.S. study shows that the smaller change of frequency of male voice, the easier obtain the favor of the opposite sex. In other words, a neutral sound may be more attractive.(read entire article)(posted on: 2010-04-20)
View : 321 Times

Lg Bl40 Cellular Phone Overview    By: Yasin Resif
The LG BL40 features an alphanumeric keypad in portrait mode and a fully functional QWERTY keyboard in the landscape mode on the display.(read entire article)(posted on: 2010-04-20)
View : 111 Times

Nokia N96 Compared To Lg Km900 Arena    By: Yasin Resif
Both of them have standard Li-Ion batteries, when fully charged the Nokia N96 provides a talktime of 3.5 hours, a standby time of 220 hours along with a music playback time of 14 several hours whilst the LG KM900 Arena provides a talktime of 3 hours 50 minutes, standby time of 300 hours and a music playback time of 30 hours.(read entire article)(posted on: 2010-04-20)
View : 122 Times

Story Of Lg Electronics    By: Yasin Resif
LG Electronics is really a dominant organization within the electronics industry. Its subsidiary LG Electronics USA is also prevailing within the North American marketplace.(read entire article)(posted on: 2010-04-20)
View : 118 Times

Lg Washer - Key Features Of This Modern Washing Device    By: Yasin Resif
Some buyers report that their LG Washer ends up smelling mouldy after time, this is often easily rectified by cleaning the rubber tubing with warm water and soap.(read entire article)(posted on: 2010-04-20)
View : 95 Times

How Does A File Encryptor Work?    By: Lenora Chen
An encryptor software program plays a very important role when it comes to protecting information online or offline. In this Internet age, where almost everything is now connected to computers and World Wide Web, there has been a growing need for a program that can provide optimum protection to the electronic data. File encryption is a process where a third-party or a first-party software solution is used to encrypt an entire file. When a file is encrypted, the data is actually rearranged randomly but on the basis of a specific yet highly complicated algorithm. The idea is to prevent others from misusing the data, as a file encryptor makes it completely unreadable by others. It can be used only after decryption, which is another process, where the encrypted information is rearranged in its original format. The Level Of Protection The level of protection that an encryptor software program can ensure depends on the length of the algorithm used. The lengthier it is, the complicated the encrypting decrypting processes become. It will be extremely difficult and almost impossible for a third party that is not authorized to use the encrypted information to decrypt the same without the use of the algorithm used in the process of offline or online encryption. The complexity of the algorithm is determined on the basis of its bit size. The bigger its bit size, the more protection it can provide for the data in question. Some common sizes include 256-bit, 128-bit, 64-bit, and 32-bit. Data Encryption By Servers When an encryptor program uses the server to encrypt information on other computers that are attached to it, it is commonly referred to as client-side encryption. This process is crucial to ensuring protection of information while it is on its way between the workstations and the server. Sometimes files are hacked even before they reach the server - it usually happens during online data transfer. The encryption online makes the file unreadable. So even if unauthorized people hack it, they will not be able to misuse the same. Whether the file remains encrypted or it is decrypted automatically once it reaches its actual destination, it depends on the settings on the server. You can set the options based on your specific needs and requirements. Client-Side Encryption Versus Whole File Encryption The techniques used by an encryptor might be similar in both processes. It is just that both these options are available. It is up to you to decide which one of these two processes you have to use. In general, the only difference between them is that where the client-side encrypting process is used to ensuring safety in data transfer, the whole file data encryptor is used as a general security measure. You must have the original algorithm that was used to encrypt files to decrypt the same. No matter which online decrypt programs you use, there is no way to perform decryption without the original algorithm. Some encryptor programs are capable to decrypt the files automatically, but many of them will assign a specific key to you when you encrypt a file and then the program will ask you to enter that key to decrypt the file back to its original format.(read entire article)(posted on: 2010-04-20)
View : 60 Times


Page: << <    1571  1572 [1573]  1574  1575  1576    > >>

See As RSS




Login To Account
Login Email:
Password:
Forgot Password?
New User?

Sign Up Newsletter
Email Address: