2008年2月24日 星期日
LAMP
Linux-OS,
Apache- web server,
MySQL -database server,
Perl( or PHP, Python)-programming language.
(Combining 4 technologies together)
LAMP is use to run used to run dynamic web site or servers. And people are so interesting in this because
First, LAMP is free and open sources.
Second, it is stable.
Third, the efficiency is as good as “J2EE” and “.Net”.
2008年2月17日 星期日
Chapter 3- first two bullet points in Exercise 3.4 (p38).
1)
- I believe that the reason why the police damaged the painting was because he did not agree with how they paint the mural. basciallt, he sis not like the idea how they gonna paint the mural.
- Also, i believe the factor was because the those people's image(Virgin of Guadalupe, Jesus, Padre Miguel Hifdalgo, Mother Theresa) in his mind is way too different with those artists, students, etc's idea.
- The ideally way to respond this situation is to report that to the person who has higher prosition in the police system; or even better, report to the news, let the whole society know this thing.
2) i believe that "I" and "We" are unseparatalble, "We" are maded by "I". Without "I", there are no "We"; and without "We", "I" means nothing. For example, each students, artists are "I," and the mural is made by "We." the mural repersent all "I"s = "We."
More Privacy
2008年2月10日 星期日
Service Learning. Chapter 1 of Learning Through Serving.
Privacy.
2008年2月3日 星期日
career plans and goals
and after that, i hope that i can open my own company to sell something creative and interesting.
and in fact, what i really wanna do is to be a philanthropist and help those poor African kids.
so as long as my job in the future can help my family, African kids, and meaningful. i ll be more than happy to do that.
1. Explain the difference between symmetric-key and asymmetric-key encryption.
How are keys distributed with each technique?
symmetric-key:
It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit.
asymmetric-key:
It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.
Why is each technique cryptographically secure? In other words, what needs to be done to crack a ciphertext encrypted with each algorithm?
symmetric-key:
because the symmetric-key system only need one key, in order to crack the message, you only need the key. Or you can find the pattern how they encrypt the message. For example: the encrypted message is “Lbj-Xfo,” and you can probably guess that the real message is “Kai-Wen” by moving each letter to the prior letter. (but you probably need to try out every single possible.)
asymmetric-key:
asymmetric-key is like double encryption. First, the user use his private key to encrypt the message, them he/she public the message with public key; although everyone can see the message, only the person with his own private key can decode the message. So, in order to crack the system, you need the person’s private key, or need to know how they created the private key. It is almost impossible to crack the system because the key is too big.
How can each technique be used to confirm a sender's identity?
symmetric-key:
Symmetric-key confirms sender’s identity by knowing who can encrypt the message or decode the message; in other words, by knowing who has the key.
asymmetric-key:
Asymmetric-key confirms the sender’s identity by double the encryption. One person encrypt the message with his private key, and send that with public key. And only the person with another private key can decode the message. The person can also use his private to encrypt his sign in order to let the other person know who he is. (Digital Signature)
What are the strengths and weaknesses of each approach?
symmetric-key:
- advantages
Safer (lots of probability), and faster.
- Disadvantages
One time transactions, how to give the key to the other person. And once other people know the key, you have to change the key at both sides.
asymmetric-key:
- advantages:
Allow letting other people read the encrypted message without any risk.
No problem for distributing the key.
- Disadvantages:
Big and slow.