PCSTATS Main Page Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Beginners Guides: Encryption and Online Privacy
Beginners Guides: Encryption and Online Privacy - PCSTATS
Abstract: This article aims to cover the basics of online security, including a description of the methods online stores use to protect themselves and their customers.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Sep 23 2003   M. Dowler  
Home > Reviews > Beginners Guides > PCSTATS


Encryption is used frequently by modern operating systems, both online and off. Anytime there is data such as passwords or other sensitive information that needs to be stored or transferred between computers, encryption is generally used to render it undecipherable to all but the intended recipients.

For example, all modern versions of Windows store user passwords not in plain text as they are entered, but in a numerical hash of the original, encrypted by one of several different methods. In this way, nobody can gain this information simply by browsing files or the registry.

With the increasing use of the Internet as a medium for carrying information, encryption has come into its own. If you are transferring data across a public network, you want to at least make sure that the data is sufficiently encoded as to make it unreadable to the casual eavesdropper. The basic principal behind most computer data encryption methods is that each computer participating in the transfer of encrypted data will have a numerical value (key) which it will use to encode the data it sends over the wire into a meaningless collection of characters.

Depending on the method of encryption used, this key will either be agreed on with the remote computer before the data is sent, then used by both computers to encrypt and decrypt the data, or one computer's key will be used to encode data only for another computer's separate key value to decode, and vice versa. There are many methods of encryption currently in use, and we will look at the ones most commonly used in Internet transactions.

SSL introduced (and a brief TCP/IP primer)

SSL, or Secure Socket Layer, is a method of securing standard Internet transactions by using encryption. 128-bit SSL encryption is the standard for secure communication across the Internet.

All communication on the Internet is accomplished using the TCP/IP (Transmission Control Protocol/Internet Protocol) suite of protocols to prepare and transmit data. TCP/IP uses the idea of sockets, which can be thought of as the endpoint where data is dumped from the Internet into a computer and organized for specific applications to use, much as a telephone turns electrical signals into understandable sounds.

Like a telephone, a socket must have an address, which is composed of the IP address of the computer (for example and the port number that the application receiving data from the socket wishes to use. Port numbers are simply areas where data can enter the computer remotely.

TCP/IP allows for 65,535 ports on each computer. Ports between 1 and 1023 are the well known ports, which are reserved for commonly used protocols and applications such as HTTP (port 80), the port through which your computer receives web page information to display in your browser, and FTP (23).

Registered ports are between 1024 and 49,151 and are used by software developers who need their applications to communicate remotely with TCP/IP. Dynamic and private ports are between 49,152 and 65,535 and are generally used when an application (for example the audio/video chat feature in Microsoft's MSN Messenger) needs to create additional connections on the fly after the initial connection (using a registered port) has been made.

So to recap, a socket equals a computer's IP address plus the port number that needs to be accessed. A socket is necessary for a continuous flow of information to pass between two computers using TCP/IP protocol, and therefore, for any Internet communication between a server and a client computer.

< Previous Page © 2022 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >


Contents of Article: PCSTATS
 Pg 1.  Beginners Guides: Encryption and Online Privacy
 Pg 2.  — Encryption
 Pg 3.  Public key and symmetrical encryption methods
 Pg 4.  Digital Signatures
 Pg 5.  How to know that you are using SSL
 Pg 6.  Browser security concerns
 Pg 7.  Managing Cookies
 Pg 8.  Temporary Internet files folder
 Pg 9.  DIY privacy, encrypting your files
 Pg 10.  Creating a recovery agent
 Pg 11.  Exporting a data recovery certificate

Hardware Sections 

PCSTATS Network Features Information About Us Contact
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2022 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.