Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Are their any informed opinions on the use of Public Key Infrastructure (PKI) and this article on alternative modes of authenification: http://www.DGA.co.uk/customer/publicdo.nsf/public/WP-HERESY I haven't delved much into encryption nor the authentificaion process for Linux platforms. Does Linux have alternative methods of authentification such as those discussed in the article? If so and If not, how to implement??? -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.blu.org/pipermail/discuss/attachments/20000616/a341fceb/attachment.html>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |