Best Tutorials website


A three-pronged solution for identifying users

A three-pronged solution for identifying users

The problem of system security starts with discovering the identity of the user on the other end of the communications link. This article discusses three familiar approaches for identifying users, highlights their strengths and weaknesses (alone and in combinations), and provides some examples of each.




Views: 878 | Rating star | by John




View this tutorial
Broken link Report broken link?