Packet Switching –
This terms refers to the data from one computer sent to another is broken up into packets and sent along best routes. Parts of the original data is tagged with information of where it is from and where it is going so this allows all different types of packets.
Pretty Good Privacy. One of the most popular and widely used encryption system.
An extension, similar to modules that can be executed within browsers to take advantage or be compatible with certain functions.
Point to Protocol. A version of TCP/IP software designed to handle Internet communications over dial-up connections.
Private Key –
The key used to decrypt cyphertext in public-key cryptography.
Public Key –
The key used to encrypt plain text in public-key cryptography.
Public-Key Cryptography –
A form of cryptography that uses two keys: a public key and a private key.
Public-Key Encryption –
An encryption method that uses a pair of keys, a public one that encrypts the message and a private one that decrypts it.
A computer found at each intersection on the Internet backbone that examines incoming data (eg packets) and forwards its data to its destination.