Using the ethereal program. Day #2. Headers (envelopes or folders) followed by headers
followed by more headers, finally followed by the actual data or payload information.
Ethernet header, IP header, TCP header, HTTP header example from class.
Encrypting strings using the PERL crypt function. This function is
often used to encrypt passwords. (See Wednesday c3.html for more PERL and Caeser cipher
illustrated for UNI Panthers plaintext).
What kind of cryptography will stop your kid sister from reading
your files and WHAT
is Cryptography? Its hard to decipher your handwriting?
Its hard to decipher cipher text, but no deciphering is needed
for plain text.