ONLINE GENERAL STORE

COMPUTER STORES

Home
Textile
Advt
Book
Health
Computer
Engg
Music
Co op

Gtask online general store-Computer stores

Search many computer-related quality products
The area of interest is networking. So We have discussed below about protecting a company's transactions in a more secure manner.

Beginning with networks, it was an academic curiosity in the year 1980.These networks were used by universities and large business in the year 1988.In 1996,computer networks,especially the internet, had become a daily reality for millions of people.The networking picture has changed radically towards wireless networks.

Computer network is a collection of autonomous computers interconnected by a single technology. Computer networks are a boon to business applications.Considering an example of computer network in business applications, a company’s information system is consisting of one/more databases and some number of employees who need to access them remotely. The data that are stored on powerful computers which are called the servers and employees have simple machines, called clients with which they can access data. The client and server networks are connected by a network.

The two important networks architecture are the OSI and TCP/IP reference model in computer network.The Open System Interconnection (OSI) model deals with the system that is open for communication with other system. It has seven layers.The TCP/IP reference model - it’s the ability to connect multiple networks in a seamless way. It has 4 layers.Moving towards network security which is looming on the horizon as a potentially massive problem. Following below is the algorithm which secures the data sent from the sender to the receiver from the intruders.

RSA algorithm:

RSA algorithm is one of the public key algorithms. A new kind of cryptosystem, one in which the encryption key( i.e.) the message sent by the sender on which a security key  is applied so that the message becomes a encrypted message  and decryption keys (i.e.) a security key is applied by the receiver to get the exact message  sent by the sender and thus protecting the message  from the intruders .In this algorithm ,the decryption key could not be  feasibly  derived from encryption .

For example:  SUZANNE is the plain text which has to be sent to the receiver by protecting from the intruders. The receiver will be able to receive the text exactly the same sent by the sender in a secured manner. Mail for the application of RSA algoritm

Adavantage of RSA : More secure which is more usefull in business applications so that the information regarding the company  can be sent in a secured manner.

Now Telecommunication is fast becoming a cost saving strategy thanks to the continuing recession that is financially crippling businesses across the globe. Many organisations are planning to go the'virtual way'as far as feasible. The idea of extending 'work from home'option may reduce the overhead costs.web casts, teleconferencing and video conferencing provide excellent plateforms for holding meetings.If your business supports,it is a good idea to save cost by downsizing office space rather than downsizing staff.(A healthy cash flow is vital for sucess of a business. Get payment intime without losing a clint.Tough times do not come after prior intimations.)

Computers:

Comodo Internet Security:

Know a few computer virus:

  • Macro Viruses
  • Network Viruses
  • Logic Viruses 
  • Companion Viruses 
  • Boot Sector Viruses 
  • Trojan horse
  • Polymorphic Code
Wireless : Help your customers get great Wireless Service with nationwide coverage via Voice stream, Liberty Wireless Nextel and Verizon Wireless, as well as the latest cell phone technology from Nokia, Motorola, Ericsson, Kyocera, Samsung, Siemens, Audio ox, Panasonic...to name just a few.
 
All the tools and strategies you need to succeed online. Get what you need to succeed at VeryVIP.
 
Your Name.com : Over 70% of Internet users research a product or information online before making a decision to purchase. Better grab it before someone else does!

OnlineStorage&Sharing  Store, access and share files online from anywhere at anytime. 

 Lycos mail | Tripod website | Trellix web hosting | Site name : http://gtask.tripod.com


Disc Space is around 765 KB Total Space 20.0 MB

Site link : Home  Textile  Advt  Book  Health  Computer  Engg  Music  Co-op