Let’s first understand what data? Data is not information. All information will be referred to a computer data cursed. Data from the Latin word “mattut” is plural. In the system, what type of data is referred to as. There are two types of data, the first of a character or numeric data, and the second is referred to as a binary. First, in an easy to read for humans. The second is an activity that helps computers. Computer programs they want to read.
What is data protection: Generally, the protection given by a word that means something ,. For example, the house protects us from getting wet, and it will not be able to receive information on other computers, etc. The word is that when it rains, and safety and to protect the data referred to. Computers, hard disk, etc., which are permanently secondary storage device, floppy disks, CD-CD, is stored. We must protect them from access to change or be destroyed. There are two types of data; They are in the private and public sectors. Public data is available to the public, etc. The data name and password, address, and phone number are featuring, science, technology, mathematics, etc. This includes all information about the fields in certain areas, the information is not public data. May have specific data. It depends on how the data is organized to protect it from being accessed.
In general, we store information or data in the form of files to secondary storage devices. Computer checks that the data is protected. If that were true, then the system does not provide the user data. In the case of Microsoft family of operating systems, buddha (FAT) information stored in each file. And each row corresponds to a single file with the file allocation table, row and column of a table. Columns, and the file name, and data from various file attributes where a title should be changed. One way, perhaps, fat, FAT16 file is the only way to provide care, FAT32, hidden, read-only has to do with them. However, knowing the file without any difficulty, can be accessed directly, there is a user, not enough. This greatly increased the security options for Microsoft NTFS (File System if), then released.
With the advent of technology, customer service, revolutionary changes in the computer system. A user name and password, you can set options, where the level of files and folders in the NTFS security concept, was introduced. User has sufficient permissions to access the file. However, there are many Alpha Fund Software review problems with the tar Q *. The user name and password and have been secured. So, it introduced the concept of the so-called encryption and decryption. The basic idea is to convert data from one form of encryption. For example, encryption, then the ‘Z’ may, ” A ‘letter, I think. Encryption decryption just the opposite. Which ‘Z’, but rather, after decryption, ‘a’, have become.
Encryption and decryption, and includes many complex mathematical formulas. An encryption and decryption, writing programs, to be good at math. Even today, no one knows the actual process, but the author of the program. However, it may lead to many smart guesses can break the encryption code. Therefore, it was difficult to predict the users several encryption and decryption algorithms. Find the best encryption and decryption process is already on its way.
A safety measure, the second, except encryption, firewall. A firewall is a program that monitors traffic. Transportation is a collection of files. It may be a network or a normal file. A firewall prevents the entry of certain files or data. Depending on the characteristics of the data file, it checks the status of permits or prevents the file. If a system can prevent from getting abc.txt file, assume that. So, as we prepare to enter our messages or files on the system, which can block or allow.