Saturday, 16 February 2013

What Is DES Cryptography?




DES cryptography is based on a special 56-bit encryption key algorithm.

Encryption is a process of converting simple strings of text data into a scrambled version of characters. This cryptographic process is completed by using special hashing algorithms with the unique 56-bit encryption key.

The National Institute of Standards and Technology is the governing body that manages encryption standards within the United States. This group accepted DES cryptography as the defined standard for data encryption between the years of 1974 to 2001 for all government agencies.

There were many permutations of the DES cryptography during its reign as the standard for data encryption.

In early 1986 it was used in video ciphering. This encryption process was the defined method used by cable companies to scramble cable video broadcasts. This forced customers to purchase special video cable boxes that included the DES encryption algorithm . This algorithm was required to unscramble the video broadcast.

In 1998 an encryption program was created to prove the weakness of the DES cryptography. This was created by the Electronic Frontier Foundation and known as DES cracker called “Deep Crack.”

The program was able to break the code for DES in 56 hours. This was the final blow to the DES standard, which forced the creation of the new AES standard.

What is Data Independence?




Data independence is a form of database management that keeps data separated from all programs that make use of the data.

As a cornerstone for the idea of a DBMS or database management system, data independence ensures that the data cannot be redefined or reorganized by any of the programs that make use of the data.

While data transparency still exists as far as the ability of different applications to access and use the data for completing tasks, no program or application can read and then begin to make changes to the data itself.

The ability of the data to be modified by the program, and vice versa, means that the data is not considered constant and may be changed either by initiating the change through modifications to the source code or through using the program in other ways to adapt the core data.

One of the functions of data independence is to restrict access to the storage structure of the data by the user applications.

Logical data independence makes it possible to change the structure of the data independently of modifying the applications or programs that make use of the data.

The second type or level of data independence is known as physical data independence. This approach has to do with altering the organization or storage procedures related to the data, rather than modifying the data itself.

How Do I Erase Deleted Files?




While putting a file in the trash, and then deleting it, may same like a good way to get rid of a file, the truth is that the file is still there.

The thought that the file is completely gone is a common misconception, but more savvy computer users are becoming aware that deleting a file actually does nothing of the sort.

One of the easiest ways to erase deleted files is to format the hard drive .

Usually, this will wipe the system completely clean, and even programs that usually are used in the recovery of deleted files will not be able to find them. This is one of the most drastic ways to get rid of files, but it usually does work.

Another way to erase deleted files, is to use a data eraser program .

Software that does a complete data wipe is very similar to formatting the hard drive. This will completely erase deleted files, along with all the other files on the computer.

Other types of software used to erase deleted files can be used for single files only. This is probably the situation that most computer users will prefer. This will keep all other files on the machine, and save the user from the time-consuming process of reinstalling all their desired software products on the computer. This type of software is sometimes called a data shredder , and basically writes over the file several times with random data.

What Is the Data Encryption Standard?




Data encryption is the process of scrambling strings of plain-text data into unrecognizable values. This is an effective security measure for digital data because it makes the data useless to prying eyes.

The data encryption standard was the first defined standard for digital data encryption. This standard was created in 1976 by the United States government as a way to secure sensitive government information.

Data encryption is a process of transforming plain-text data into a unique set of characters.

Encryption is an automated version of cryptography that creates a secret message for computer data files. This process uses complex encryption algorithms, which are mathematical functions that manipulate data based on defined standards.

An encryption algorithm uses the encryption key to transform the plain-text data into a scrambled format. This key is unique and must also be used for the deciphering process.

The data encryption standard was an early version of digital encryption and required a 56-bit encryption key.

Many legacy computer platforms use the data encryption standard. This encryption algorithm evolved into a triple DES standard version, which was an attempt of creating complex encryption keys while retaining the small 56-bit key.

What Is Information Hiding?




If a program keeps its core separate from its interface, then one or the other can easily be changed without affecting its partner. This allows small changes to the program’s core features or the potential for a scalable interface, all while providing a simple upgrade process for the program.

Early languages required the programmer to write the program in a continuous sequence; the first line of the program was at the top and the last line was at the bottom.

Many rely on individual “objects” that will each perform a specific task. This not only simplifies writing the program, but it allows a specific piece of code to operate over and over without needing to be rewritten.

For example, if the program requires a result from a specific math function five times, rather than writing that process out five times, the programmers will make that function into an object and have the program call it up five times.

The processes used in information hiding rely on the object nature of programming.

When writing a program that utilizes these concepts, the objects are designated for individual portions of the program.

If a portion of the program uses only its own objects, it is easier to modify that portion of the program.

What Is Data Semantics?




Data semantics is the study of the meaning and use of specific pieces of data in computer programming and other areas that employ data.

In data semantics, the focus is on how a data object represents a concept or object in the real word.

Semantic meaning occurs only when a group agrees on specific definitions for certain data types or words.

The need for data semantics arose in the 1970s when the United States Air Force developed a program to help people communicate more clearly about current manufacturing techniques they were using.

One example of how data semantics helps relate pieces of code or data to the real world is a library card catalog.

In a computer database, a space of memory for holding a book's title and information can be thought of as a virtual version of the original paper title card.

The creation of data semantics is similar to mapping out grammar and style rules that determine how words are used together to convey a specific meaning.

What Is Data Hiding?




Data hiding is a method used in object-oriented programming to hide information within computer code.

It presents several advantages for programmers, because objects are unable to connect to irrelevant data and hackers are less likely to be able to access data.

At the same time, hiding data can make it harder for a programmer , who may need to use more code to create effects in hidden data than would be necessary if the data were public.

If an object does access hidden data, it will return an error. This is because the object cannot see the data, so any functions or data that are labeled as hidden will look invisible to the object.

Data hiding ensures that, if a programmer does make this link, the program will simply return an error so the programmer can quickly correct the mistake. This also ensures that all of the objects are truly isolated units, which is the main concept of object-oriented coding.

Volatile data are typically hidden because, if such data were made public, it could damage the object and destroy the entire program.

By hiding the data, it's much harder to crack the code, because the data will appear invisible to the objects and the hacker.