Security Technologies 2
Tuesday, August 16, 2011 1:49 AM
Encryption
image credit : google
It refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm.
Oh,
Hey!
my name is
SARAH and i think
koreans are haawt. LOL ^___^v
17 y.o
studying at LPU Batangas
My Boss, my Creator and my Father is GOD..
I am Blessed with His love and i want to share it with others :)
Wild, crazy, and a huge rebel.
having amazing ideas, and the power to carry them out.
some people find me to be selfish and a bit overbearing.
a very blessed person. things just always seem to go my way.
since I am so BLESSED, I don't really have a lot of worries. just hoping and praying for the best in life.
i do have a lot of life experiences.
a natural peacemaker, and especially good at helping others get along.
but keeping the peace in my own life is not easy. i see things very differently, and it's hard to get me to budge.
i also have a very active imagination. often get carried away with my thoughts.
prone to a little paranoia and jealousy.
at times, I can be a little flaky and irresponsible.
but for the important things, I pull them together.
but above all I have no regrets in my life because I know that God has His BEST PLANS for me.. :D :D :D
-That's me
Hey~! Don't forget to comment me on the third heart! pls~~ do comment me! >___< thanks~ ^___^