In the lexicon or glossary explains abylonsoft topics of general interest around the offered software products, computers and technology. The column with the letter C contains 11 entries, like for example Clustertips.
Certificates are usually stored with the file extension PFX or P12 and contain a set of data about the issuer and owner. With the public key (PKCS#7) and private key (PKCS#12) data can be authenticated, digitally signed or encrypted and decrypted. The issuer (Trustcenter, CA) normally guarantees the credibility of the data specified in the certificate. In order to increase credibility, a certificate can be signed by several CAs.
However, self-signed certificates are also useful, for example for signing in a circle of friends or simply for encrypting your own data.
The Certification Authority is abbreviated as CA. More information at Trustcenter.
see also: Trustcenter
Chip cards are an invention from the 1970s and in principle designate a plastic card with an integrated electronic component. The integrated chip can be a simple memory or a processor with its own operating system. The data on the chip card is often protected against access by encryption and PIN entry. Communication with the card takes place via special readers, whereby this takes place via 6 or 8 gold shining contacts or, in recent times, also via radio (RFID).
Many smart cards have a unique ICC ID (e.g. in mobile radio). This is also used by abylonsoft-Software for unique identification, for example for encryption or Windows login. The best known smart cards are those measuring 85.60 mm x 53.98 mm, such as the EC card or the EU driving licence. SIM cards are also processor chip cards, but for space reasons they only have a size of 25 mm x 15 mm or recently 12 mm x 15 mm.
Ciphering is a French word for encrypting and "Chiffrieren" is also used in German.
see also: Trustcenter
The company claviscom from Solingen was a long-term partner of abylonsoft. It marketed the products claviscom SHREDDER, claviscom LOGON and claviscom DATA DRIVE as private label versions. After the discontinuation of business operations in 2008, claviscom's product line was no longer offered. All claviscom customers could and can switch to the comparable products of abylonsoft. For this abylonsoft offers attractive update offers.
Cloud Computing is an up-and-coming area of information technology whose turnover is constantly increasing. Cloud computing is the central provision of services over the Internet, such as infrastructure or programs. In the case of cloud storage, the user is provided with storage space on a hard disk in a data center. The advantage is that the data is stored centrally in the cloud, the so-called data cloud. This allows data to be accessed from several computers and even other digital devices (tabs, mobile phones, etc.). The advantage is also the disadvantage. Since access is only possible via the Internet, a stable data connection with the highest possible data rate is required. In addition, there is always the uncertainty as to whether the data is secure during storage and data transmission. Depending on the cloud provider, various functions are offered for this purpose, such as encrypted transmission via SSH. If you want to be on the safe side, you can also encrypt your data manually with our software abylon BASIC or automatically with abylon SHAREDDRIVE.
The hard disk is divided into many equal parts, the so-called sectors. Several sectors taken together are again a cluster. Each file is stored in a cluster, only if the file is larger will two or more clusters be used. However, it is very rare for the file size to be exactly the size of one or more clusters. For this reason, a small space on the hard disk is usually left blank behind the file. This part is called a cluster tip, where there may be remnants of previous files. The possibly critical data can be reconstructed with special software.
see also: Shreddern
Often the process of encoding is equated with encoding or unrecognizable. The term encoding is not limited to cryptography, but simply refers to the representation of a character set by an alternative character set. This can also mean, for example, the conversion of text into Morse characters or the binary code.
The Credential Provider replaces since Windows Vista the GINA (Graphical Identification and Authentication), which is responsible for the secure authentication and logon. In contrast to GINA, the Credential Provider can communicate directly with Winlogon and transfers the collected credentials to it. There are 2 types of Windows Credential Provider:
Thus, for Windows Vista and later, credential providers are the only method for authenticating users. Since the introduction of "Windows Passport" in Windows 10, credential providers can also be used for authentication with apps or websites. In addition, it is an open interface that can be extended by other providers. This is also done by the software abylon LOGON and abylon LOGON Business, which also allows different hardware keys to be used for Windows logon.
The individual credential providers are listed in the registy under HKEY_LOCAL_MACHINE\ SOFTWARE\Microsoft\ Windows\CurrentVersion\ Authentication\Credential Providers. Alternatively, as of Windows 10, these can also be displayed via the editor for local group policies. This is opened via the Run dialog (execute dialog) with gpedit.msc. The entered credential providers are displayed in the tree under Computer Configuration -> Administrative Templates -> System -> Logon (see screenshot).
The term cryptography is used to describe the science of systematically disguising messages by encrypting them. The original data is made unreadable (encrypted) with the help of an algorithm and can only be restored by knowing the specific key. The first applications of cryptography date back to well before the birth of Christ. In World War II, for example, the decryption of the Enigma encryption machine by the English was of decisive importance. Nowadays, cryptography is divided into two major areas: asymmetric and symmetric encryption.
In modern times, cryptography generally deals with the topic of information security. Concepts are developed and investigated in order to protect a wide variety of data against change and unauthorized reading. In addition to historical encryption through transposition and substitution, modern cryptography uses mathematical methods on a binary basis.
Please use our support form for support requests Support form!