Click on image for full size document:
Introduction In cryptography publishing the algorithm used is an important principle (called Kerckhoffs' law). Many systems have attempted to achieve "security through obscurity" meaning that the algorithm was secret, but this is flawed, becau...
SERVICE SPECIFIC IP AND PORT RANGES
ANCHOR HOST NAMES
TO FIND AN IP ADDRESS:
* Open a command prompt....
Introduction Protecting your privacy and securing your data is our number one priority. Your pass phrase is encrypted twice before it is stored on the server to prevent anyone but you from recovering the stored pass phrase. The system is designed so tha...