|April 9, 2012|
|Can A New Quantum Encryption Foil Sophisticated Hackers?|
|By Mike Tuttle|
| A research team led by University of Toronto Professor Hoi-Kwong Lo has found a new quantum encryption method to foil even the most sophisticated hackers. The discovery is outlined in a recent issue of Physical Review Letters.
Quantum cryptography is, in principle, a foolproof way to prevent hacking. It ensures that any attempt by an eavesdropper to read encoded communication data will lead to disturbances that can be detected by the legitimate users. Therefore, quantum cryptography allows the transmission of an unconditionally secure encryption key between two users, "Alice" and "Bob," in the presence of a potential hacker, "Eve." The encryption key is communicated using light signals and is received using photon detectors. The challenge is that Eve can intercept and manipulate these signals.
"Photon detectors have turned out to be an Achilles' heel for quantum key distribution (QKD), inadvertently opening the door to subtle side-channel attacks, most famously quantum hacking," wrote Dr. Charles Bennett, ...
| Performance Monitoring Software for Websites, Servers and Infrastructure
Download your FREE 14-day evaluation of WebWatchBot and begin experiencing the benefits of reliable monitoring today.
||Today's Top Videos:|
|How Adele McConnell-Cummins Built a Vegie Head Community Online|
|A little over a year ago, Adele McConnell-Cummins began posting images of food on a Tumblr account. Little did she know that her hobby would build an entire community of "vegie heads" shortly thereafter.|
|What Does Music Intelligence Mean to You? The Echo Nest Explains.|
|Big data is beginning to intrigue everyone for its broad-reaching possibilities. The music industry is already taking advantage of it with platforms such as The Echo Nest, which aggregates music intelligence to ultimately create better user experiences.|
|Facial Recognition Is Not Only For Surveillance, Says Face.com|
|The idea of facial recognition has been equated with Hollywood and the government for a long time. However, companies, including Face.com, are taking the phenomenon mainstream.|
|Balancing Security And Performance As A Network Admin|
|Network Administrators play a delicate game of balancing uptime and security. Increased security often comes at the sacrifice of accessibility and/or performance. Steps to increase accessibility and uptime often create security issues. Thus, measures that can potentially bolster performance, uptime, and security are sought out as holy relics in network administration. The Pareto principle suggests that, in a majority of cases, 80% of the problems will arise from 20% of the sources. If it is possible to identify the 20% ...|
|Making The Switch To NGINX||Switching from Apache to Nginx: URL Rewriting||Datacenter on Elm Street|
|I have a total success kid moment every time I switch one of our Apache HTTP servers to NGINX. Without any significant tweaking to NGINX, we take a highly configured and pageview hardened Apache server and increase its capacity ten fold with a switch to NGINX. It comes by no surprise to me, then, that [...]||With all the awe and wonder of the Internet, one of the most amazing things about its basic function is the speed at which great ideas are shared. Many people use the term “viral” to describe how quickly a great piece of content or information is rapidly spread across the Internet. However, viral content can quickly become ...||Sure, your 120 year old Grandpa might utter incoherent nonsense 90% of the time, but pay attention when that ten-percent of conversation actually makes sense. It seems that many values of the past have gotten lost in translation, or more likely, in laziness. Do the job right the first time and other work ethic idioms [...]|
|Read More...||Read More...||Read More...|
|Other iEntry Business Resources:|
| --This email is a service of NetworkNewz--
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509