In the lexicon or glossary explains abylonsoft topics of general interest around the offered software products, computers and technology. The column with the letter R contains 8 entries, like for example RFID Radio-chip-cards.
The abbreviation RAS stands for Remote Access Sservice and offers from Microsoft Windows NT the possibility to access a server in a secured network from an external client via a "telephone line". The variable protocol support of TCP/IP, IPX/SPX or NetBEUI provides the user with complete file and printer access. Nowadays the VPNs (Virtuell Private Networks) are increasingly used for telework (home office). One
With RC4 from RSA Data Security Inc. a random byte sequence in the length of the data to be encrypted is generated with a pseudo-random generator depending on the password. The ciphertext results from the simple XOR link with the expanded key, similar to the One Time Pad. For decryption, this procedure is simply used again. The procedure is surprisingly simple, fast and very easy to program. According to RSA Data Security Inc., this method cannot be cracked with linear or differential cryptanalysis. However, since the end of 2013 there has been growing evidence that the NSA can decrypt RC4 encryption in real-time. For this reason, the use of RC4 has been prohibited since February 2015 for the SSL successor TSL (Transport Layer Security). As with any power encryption, there is no protection against changes. All compromised bits are also changed in the decrypted file without this having to be noticed.
see also: One Time Pad Verschlüsseln Symmetrische Verschlüsselung Asymmetrische Verschlüsselung
RFID radio chip cards have no contacts and communicate via an electromagnetic wave. This technology is often used for automatic identification. Passive cards draw their power from the high-frequency signal of the reader. The transmission distance depends on the frequency and is normally limited to short differences of a few centimeters. In addition to chip cards, RFID transponders are also installed in labels, key fobs and numerous other products. Since 2010, RFID chips have also been integrated into German ID cards.
The RFID technology is used for electronic locks, access control, authentication, cashless payment, customer cards and also key for Windows logon or encryption in the software from abylonsoft.
The most common frequencies are 125 kHz long wave and 13.56 MHz short wave. Depending on the region and application, UHF and SHF frequencies are also used. The speed, transversion rate and range is largely dependent on the frequency. Common RFID chip cards are:
see also: Chipkarten Access Control
RSA is named after the developers Ronald Rivest, Adi Shamir and Leonard Adleman. Besides PGP, RSA is the best known method for asymmetric encryption and signature. From a key length of 2048 bits, the flagship asymmetric encryption method can still be classified as secure today. As an asymmetric procedure, RSA uses a key pair consisting of a private and a public key. Because the mathematical effort for live encryption is very high, usually only one session key is encrypted asymmetrically. The actual data is then encrypted with the symmetrical session key.
see also: Asymmetrische Verschlüsselung PGP Public Key Public Key Verfahren Signatur
In the Windows registry the key RUNONCE
is offered in the path [HKCU] or [HKCU]\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
. Programs can be entered here to be executed once after a Windows login. This is used, for example, by installation programs or one-time administrative tasks. After the execution the entry of operating system is deleted immediately. For this reason, this key is usually empty. There are however particularly stubborn programs, which register themselves here before each shutdown, in order to be started likewise after the restart. For the user there is no easy way to prevent this. The application abylon APP-BLOCKER monitors this folder in the registry under [HKCU] and [HKCU] and allows to prevent unwanted entries.
see also: Windows AllUser Windows User Windows Autostart Dienste Prozessliste
With the key RUN
in the Windows registry you can register applications which should be executed after the Windows logon! In contrast to the Autostart folder in the Windows Start menu, the registry entries are not so easy to find for most users. For this reason, many applications use this location to be started automatically every time they log on to Windows. Often, in the course of time, so many programs are registered here that the start time of the PC is considerably extended and the processor performance is reduced. This registry key should therefore be checked from time to time for unnecessary or unwanted entries! The software abylon APP-BLOCKER helps to monitor the autostart entries, where a distinction is made between User under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
and AllUser under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
.
see also: Windows AllUser Windows User Autostart Dienste Prozessliste
The Registry (registration data base) was inserted with Windows NT and developed until today. The Registry is a database in which Windows and Windows applications store information and settings in a structured manner. In contrast to the file-based storage of information in INI or XML files is extremely fast by the hierarchical structure the access in the Registry, despite the multiplicity at contained data. Advantageously the Registry is also in the network, whereby several computers can be controlled centrally over Policies. The Registry is divided into the main groups HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE and HKEY_CURRENT_CONFIG, which are comparable to folders. Below, the data is stored in the respective subfolders and can be of the following data type.
Access to the individual data is via the specific registration path (RegPath). Windows offers the editors regedit.exe
and regedt32.exe
(incl. network access) as home remedies for this.
The registry editor is called:
regedit
in the taskbar search box and select regedit
in the Run field (right mouse button menu from Start) and confirm with OK.Changes to the registry can also be made using programs or shell scripts or REG files.
see also: Dienste Prozessliste RUN (Registry) RUNONCE (Registry)
These certificate revocation lists are offered by the trust centers (CA's) and contain all invalid and revoked certificates. Certificate revocation lists are an important part of the Public Key Infrastructure.
see also: Trustcenter Certificate Certification Authority
Please use our support form for support requests Support form!