Blogger templates

Pages

This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Friday, 26 October 2012

Key Databases

Each cryptographic service provider (CSP) has a key database in which it stores persistent cryptographic keys. Each key database contains one or more key containers, each of which contains all the key pairs belonging to a specific user. The following illustration showsthe relationship between CSPs, key databases, and key containers. The CSP stores each key container from session to session, including all of the public/private key pairs that it contains. However, session keys are not...

Hashing and Digital Signature Algorithms

This section lists several algorithms used to compute hashes and digital signatures. Each of these algorithms is supported by the Microsoft RSA Base Provider. The MD2, MD4, and MD5 hashing algorithms were all developed by RSA Data Security, Inc. These algorithms were developed in sequential order. The later algorithms are generally more secure than the earlier ones. All three algorithms generate 128-bit hash values. The secure hashing algorithm (SHA) was developed by the National Institute of Standards and Technology (NIST) and by the National Security Agency (NSA). This algorithm...

Digital SIgnature

What is a Digital Signature? An introduction to Digital Signatures, by David Youd Bob (Bob's public key) (Bob's private key) Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private Key. Bob's Co-workers: Anyone can get Bob's Public Key, but Bob keeps his Private Key to himself Pat Doug Susan Bob's Public key is available to anyone who needs it, but he keeps his Private Key to himself. Keys are used to encrypt...

Free Recharge for Airtel,Tata Docomo,idea,vodafone,aircel,Bsnl....etc

hi friends here i published free recharge trick this is work in all over india Plz do some simple step and get recharge on ur mobile Click here to enter the trick...

Wednesday, 3 October 2012

DATA BASE MANAGEMENT SYSYTEM(DBMS)

WHAT IS DATA?Data is the name given to facts or entities such as names and numbers. e.g.  Weight, prices, marks etc.WHAT IS INFORMATION?Information is the data that has been covered into more useful forms.WHAT IS DATABASE?A database can be defined as a collection of coherent, meaningful data (information) or database is the facts or information placed in an organized form. Without any organization information has no meanings. A database is an organized collection of data that is useful to us. The data inside in a database can be modified, deleted or new data can be added. They are stored...

Oracle

INTRODUCTION TO ORACLE click here to get free recharge on ur mobile   A relational model, made by Dr. E.F Codd in 1970, sponsored by IBM, accepted as definitive model for RDBMS. This language developed by IBM to manipulate the data stored within Codd’s model was originally called Structured English Query Language(SEQUAL) with the word English later being dropped in favor Structured Query Language(SQL). In 1979 a company called Relation Software, Inc. released the first commercially available implementation of SQL. Relation Software later came to be known as Oracle Corporation. Oracle...

DBMS SQL Queries

Command: Create Purpose: This command is used to create tables.Syntax: Create table <table name> (column 1 data type<size>, column 2 data type <size>);Example::SQL> create table student2(s_no varchar2(4), name char(15), roll_no varchar2(6), branch char(10));   Command: Desc Purpose: This command is used to describe table.Syntax: desc <table name>;Example::SQL> desc student2;Name Null? Type   Command: Insert Purpose: This command inserts values in the table.Syntax: Insert into table name (col name 1, column name 2) values (value1, value2);Example::SQL>...

Page 1 of 1712345Next