Showing posts from April, 2012

Einstein vs Professor

This story is retrieved from the Internet. Though the authenticity of this conversation is still in question, it's still worth it to read. Enjoy. Professor : You are a Christian, aren’t you, son ? Student : Yes, sir. Professor : So, you believe in GOD ? Student : Absolutely, sir. Professor : Is GOD good ? Student : Sure. Professor : Is GOD all powerful ? Student : Yes. Professor : My brother died of cancer even though he prayed to GOD to heal him. Most of us would attempt to help others who are ill. But GOD didn’t. How is this GOD good then? Hmm? (Student was silent.) Professor : You can’t answer, can you ? Let’s start again, young fella. Is GOD good? Student : Yes. Professor : Is satan good ? Student : No. Professor : Where does satan come from ? Student : From … GOD … Professor : That’s right. Tell me son, is there evil in this world? Student : Yes. Professor : Evil is everywhere, isn’t it ? And GOD did make everything. Correct? Student : Yes. Pr

Public Key Infrastructure Fundamental (Part 1)

Public key infrastructure is an infrastructure developed to ensure the data security that is being transfered within insecure network. Public-Key Infrastructure Source:  Wikimedia If we talk about PKI, we will talk about some common terms used in this area, such as  encryption , digital signatures , public keys , private keys . In Part 1 of this post, we will explore about the two terms, which are encryption and digital signatures . Public keys and private keys will be discussed in Part 2 of this post. Encryption Encryption can be considered as a process to disguise something as something else. This is most likely similar with people write letter to other using words that are understood just between them. This way, even if the letter is being stolen, the bad guy will not be able to read it and understand the content of it. Besides encryption, there is another term known as decryption . Decryption is basically the reverse process of encryption. It means that, we t