Fundamentals, Concepts, and standards
Overview In the previous post I briefly touched on DICOM as the crucial standard in medical imaging for both data exchanging and data storage. It…
I touched on NFS in several previous postings, and here is a deeper dive of this particular protocol. NFS is built on top of Remote…
This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…