The term used to refer to someone skilled in the use of computer systems, especially if that skill was obtained in an exploratory way. The term evolved to be applied to individuals, with or without skill, who break into security systems.
A dialogue between two entities, such as a user and an ssl secure server, a computer and another computer, or a program and another program, utilized for identification and authentication of the entities to one another in order to provide secure SSL authentication for online security or online payment transactions. 128 bit Digital certificates, also provide identification and secure authentication.
An algorithm which calculates a value based on a data object, mapping the data object to a smaller data object, which is the hash result. The value is more often than not a fixed-size value. A very simplistic hash function is a checksum. The kind of hash function necessary for SSL security applications is called a cryptographic hash function.
The output of a hash function, which is also known as a hash value. The output given by a hash function after processing a file or message.
The method of securing an individual system from attack, often by encryption with 128 Bit SSL (secure sockets layer).
HTTPS or https
Hypertext Transfer Protocol Secure -- A type of server software which provides the ability for "secure" transactions to take place on the World Wide Web. If a Website is running off a HTTPS server you can type in HTTPS instead of HTTP in the URL section of your browser to enter into the "secured mode", "providing" you have logged in your password, username or ID to access the secured area. There are a number of web server software products that support this protocol as well as contacting your ISP.
An application of cryptography which merges two or more encryption algorithms, especially a combination of symmetric and asymmetric encryption. Asymmetric encryption is not usually used for data secrecy except in dispersing symmetric keys in applications where the key data is more often than not short compared to the data it is protecting. Other kinds of encryption are ssl encryption, ssh secure shell, and ssh2 secure shell, or sftp for secure server file transfer with 128-bit encryption.