Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1

In a non-networked personal computing environment resources and information can be protected by physically securing the personal computer. But in a network of users requiring services from many computers the identity of each user has to be accurately verified. For authentication kerberos is being used. Kerberos is a third party authentication technology used to identify a user requesting a service.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: kerberos windows, kerberos book, seminar ieee about kerberos, kerberos for the busy admin, kerberos name, kerberos key distribution center animation, kerberos and ldap,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Kerberos computer science crazy 3 2,394 27-08-2011 09:38 AM
Last Post: devendershekhawat
  Kerberos iitbuji 1 1,818 13-02-2010 04:31 PM
Last Post: project report tiger