• Technology experts say implementing the secure protocol can slow page loading and put additional strains on corporate servers.

    CNN: Why Google's data collection snafu could be good for Gmail

  • Internet engineers also complain that RRP uses the Secure Sockets Layer protocol, which doesn't provide an audit trail for resolving domain-name disputes.

    CNN: Is domain name system vulnerable to slamming?

  • Credit card companies are working with CyberCash and Netscape Communications to develop and implement the new Secure Electronic Transaction protocol for online credit card commerce.

    CNN: Cash -- or E-Money?

  • If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure.

    CNN: Bush email hacking a wake up call

  • In the early days of his research, Cerf said, he worked on a more secure version of his networking protocol for the National Security Agency, but wasn't able to implement that technology in what would become the public Internet.

    FORBES: Made For Hacking

  • Silent Phone deploys the ZRTP peer-to-peer encryption protocol which is recognized as the leading standard for secure end-to-end communication in a Voice over Internet Protocol (VoIP) telephone call.

    FORBES: Silent Circle Adds Android For Encrypted Voice And Video Calls

  • For example, IPSec is mandatory to implement in IPv6 compliant protocol stacks, while Secure Neighbor Discovery capabilities, Privacy Addresses, and Unique Local Addresses (ULA) all provided additional security enhancements.

    FORBES: The Security Paradox Of IPv6; Shoring Up The Holes

  • Eight years ago, fresh out of Stanford, Kocher cowrote Secure Sockets Layer (SSL), the protocol that secures the vast majority of commerce on the Internet.

    FORBES: Magazine Article

  • He suggested that once the government could be sure that the EU's external borders were "secure" the UK should join the Schengen protocol on removing internal borders within the union.

    BBC: Warning over 'anarchy' in migration policies

  • Similarly, Facebook and Twitter send login credentials over a secure line and then revert to an unsecure protocol. (Users of those social networks can add an "s" after "http" to force the systems to encrypt their browsing.) Social networking sites are where people increasingly conduct private conversations, whether through Facebook's Messages or Twitter's Direct Message feature.

    CNN: Why Google's data collection snafu could be good for Gmail

  • The December summit in Denmark is intended to secure a new international agreement to replace the Kyoto Protocol, which expires in 2012.

    BBC: Japan urges India climate action

  • These referred to ways to establishing a secure communication link between different types of computers using a protocol referred to as TARP (Tunneled Agile Routing Protocol).

    BBC: Apple loses Facetime patent lawsuit to VirnetX

  • For public consumption, the change in protocol is all about protecting users, making the system more secure, warding off keystroke loggers.

    FORBES: Sex Scandals Distract While Twitter Pulls A Fast One

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定