Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
标签: programming language Java technology
上传时间: 2014-01-03
上传用户:huangld
S60V2版短信漏洞补丁ortiCleanUp_CurseSMS_103这条不到10个字符短信成功利用了SymbianOS的漏洞,使用者收到这条短信后,就再也无法打开短信收件箱功能,并可能频繁死机。由于这条短信谁都能发,所以诺基亚所有N系列智能手机、E系列智能手机都将遭遇有史以来最严重的安全威胁。目前还没有发布相关的补丁。如果你尚未中招,建议安装诺基亚和F-Secure推出的保护程序,直到诺基亚推出新固件为止
标签: ortiCleanUp_CurseSMS SymbianOS S60V2 103
上传时间: 2017-03-15
上传用户:qunquan
SecureCRT 是高度可定制的终端仿真器,适用于 Internet 和 Intranet,支持 IPv6 标准。对于连接到运行 Windows、UNIX 和 VMS 的 远程系统来说,SecureCRT 是理想的选择。 主要特性: . 广泛的终端仿真: VT100,VT102,VT220,ANSI,SCO ANSI,Xterm,Wyse 50/60, 和 Linux console 仿真(带有 ANSI 颜色)。 . 优秀的会话管理特性: 新的带标签的用户界面和 Activator 托盘工具,最小化桌面的杂乱。 会话设置可以保存在命名的会话中。 . 协议支持: 支持 SSH1,SSH2,Telnet,RLogin,Serial,和 TAPI 协议。 . Secure Shell: Secure Shell 加密登录和会话数据,包括以下支持: - 端口转发使 TCP/IP 数据更安全 - 口令,公钥,键盘交互和 Kerberos 验证 - AES,Twofish,Blowfish,3DES,RC4,和 DES 加密 - X11 转发 . 文件传输工具: VCP 和 VSFTP 命令行公用程序让使用 SFTP 的文件传输更安全。 . 脚本支持: 支持 VBScript 和 JScript 脚本语言。
上传时间: 2013-12-19
上传用户:kikye
VGA彩色信号控制器设计:用VHDL语言编写程序,重点完成三个功能: 1.棋盘格图案显示: 用三基色原理在CRT显示器上显示由横竖八彩条重叠构成的棋盘格图案; 2.在显示器上依次显示0~9十个数字: 每个数字不同颜色,每个显示大约0.4秒,循环显示; 3.显示动画效果: 将静态图像以高频率显示,造成动画效果,最终动态显示OVER结束。
上传时间: 2017-05-07
上传用户:baitouyu
Spread-spectrum techniques are methods by which electromagnetic energy generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference and jamming, and to prevent detec
标签: Spread-spectrum electromagnetic techniques particular
上传时间: 2017-06-06
上传用户:royzhangsz
This application note describes the design and implementation of a usb mass storage devic using a secure digital card,which should prove useful to developers of usb mass storage solution.This application may be used as a stand-alone MSD or as a Secure Digital/Multimedia Card (SD/MMC) reader/ writer interface.
标签: implementation application describes storage
上传时间: 2017-06-24
上传用户:weiwolkt
RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。 RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一。RSA的安全性依赖于大数的因子分解,但并没有从理论上证明破译RSA的难度与大数分解难度等价。即RSA的重大缺陷是无法从理论上把握它的保密性能如何,而且密码学界多数人士倾向于因子分解不是NPC问题。RSA的缺点主要有:A)产生密钥很麻烦,受到素数产生技术的限制,因而难以做到一次一密。B)分组长度太大,为保证安全性,n 至少也要 600 bits以上,使运算代价很高,尤其是速度较慢,较对称密码算法慢几个数量级;且随着大数分解技术的发展,这个长度还在增加,不利于数据格式的标准化。目前,SET(Secure Electronic Transaction)协议中要求CA采用2048比特长的密钥,其他实体使用1024比特的密钥。 这种算法1978年就出现了,它是第一个既能用于数据加密也能用于数字签名的算法。它易于理解和操作,也很流行。算法的名字以发明者的名字命名:Ron Rivest, AdiShamir 和Leonard Adleman。但RSA的安全性一直未能得到理论上的证明。
上传时间: 2014-01-20
上传用户:蠢蠢66
QualNet Sensor Networks Library QualNet’s new Sensor Networks Library is a much awaited feature set that supports the IEEE 802.15.4 standard, otherwise known as Zigbee. Zigbee networks are Wireless Personal Area Networks (WPANs) that are defi ned by a low data rate, long battery life, and secure networking. Zigbee networks support automation and remote control
标签: Networks QualNet Library Sensor
上传时间: 2017-07-30
上传用户:CSUSheep
A certification path is an ordered list of certificates starting with a certificate issued by the relying party s trust root, and ending with the target certificate that needs to be validated. Certification path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509 and further defined in Internet Engineering Task Force (IETF) Request for Comments (RFC) 3280. Certification path processing verifies the binding between the subject distinguished name and/or subject alternative name and the subject public key defined in the target certificate. The binding is limited by constraints, which are specified in the certificates that comprise the path, and inputs that are specified by the relying party. To ensure secure interoperation of PKI-enabled applications, the path validation must be done in accordance with the X.509 and RFC 3280 specifications. This document provides the test assertions and the test cases for testing path validation software against these specifications.
标签: certification certificates certificate starting
上传时间: 2017-07-31
上传用户:清风冷雨
What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play with your data? Maybe you need a computer locking tool that is small and easy to use yet powerful enough to make sure your machine is locked when you need to go out for a break.
标签: computer happens machine minutes
上传时间: 2017-08-24
上传用户:semi1981