Search Results - "Red Hat"

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9 by Norkhushaini, Awang

    Published 2004
    “…This research focus on Windows XP Professional and Red Hat Linux 9 operating systems because both of these platform is popular used by Malaysian users. …”
    Get full text
    Get full text
  2. 2

    Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms by Syed Mohamed, Sulaiman

    Published 2005
    “…The main objective of this work is to investigate the IP stack performance on popular platforms such as Windows, RedHat and FreeBSD and to compare their performances so that the right platform for a specific network application can be recommended. …”
    Get full text
  3. 3

    Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar

    Published 2010
    “…A search for a new paradigm against the unforeseen and paranormal attacks lead to an invention called Unique Class Encryption (UCE) that is based on the non-parametric and mysterious verses of the Al-Quran.Earlier, the Al-Muqatta’at based UCE was developed and tested in a Red-Hat cluster funded under IRPA and completed in 2006. …”
    Get full text
    Get full text