Skip to main content

Posts

Showing posts from April, 2012

Einstein vs Professor

This story is retrieved from the Internet. Though the authenticity of this conversation is still in question, it's still worth it to read. Enjoy.

Professor : You are a Christian, aren’t you, son ?
Student : Yes, sir.
Professor: So, you believe in GOD ?
Student : Absolutely, sir.
Professor : Is GOD good ?
Student : Sure.
Professor: Is GOD all powerful ?
Student : Yes.
Professor: My brother died of cancer even though he prayed to GOD to heal him. Most of us would attempt to help others who are ill. But GOD didn’t. How is this GOD good then? Hmm?

(Student was silent.)

Professor: You can’t answer, can you ? Let’s start again, young fella. Is GOD good?
Student : Yes.
Professor: Is satan good ?
Student : No.
Professor: Where does satan come from ?
Student : From … GOD …
Professor: That’s right. Tell me son, is there evil in this world?
Student : Yes.
Professor: Evil is everywhere, isn’t it ? And GOD did make everything. Correct?
Student : Yes.
Professor: So who created evil ?

(Studen…

Public Key Infrastructure Fundamental (Part 1)

Public key infrastructure is an infrastructure developed to ensure the data security that is being transfered within insecure network.


If we talk about PKI, we will talk about some common terms used in this area, such as encryption, digital signatures, public keys, private keys.

In Part 1 of this post, we will explore about the two terms, which are encryption and digital signatures. Public keys and private keys will be discussed in Part 2 of this post.

EncryptionEncryption can be considered as a process to disguise something as something else. This is most likely similar with people write letter to other using words that are understood just between them. This way, even if the letter is being stolen, the bad guy will not be able to read it and understand the content of it. Besides encryption, there is another term known as decryption. Decryption is basically the reverse process of encryption. It means that, we try to reverse the letter that is encrypted using strange words back to normal …