100 Best Web Hosts Terms

YMODEM
Popular file transfer protocol. It is faster than XMODEM, but slower than ZMODEM.

100 Best Web Hosting Terms
Term of the day
Encryption
Prevents any non-authorized party from reading or changing data. The level of protection provided by encryption is determined by an encryption algorithm. In a brute-force attack, the strength is measured by the number of possible keys and the key size. For example, a Triple-Data Encryption Standard system (3 DES) uses 112-bit or 168-bit keys and, based on currently available processing power, is virtually immune to brute-force attacks. Business to Business VPNs (Extranets) share sensitive data with multiple organizations, so demand the highest level of security. This requires public key encryption and/or secure key exchange, both of which are designed to eliminate the risk of the key becoming known to an unauthorized party.

Web Hosting Tutorials

Web Hosting Categories
Web Hosting Tutorials
Domain Registration
Email Services & Tools
Related Awards
Web Host Comparisons