Prompt Critical Solutions Blog
  • Main PCS Website
  • Blog Home

Security

A collection of 1 post
Link in chain breaking
Cipher Suites

Microsoft... You Are WEAK!

As one goes about shoring up their IT security, one aspect of the process is limiting (or authorizing) the methods in which a "secure connection" is established. A secured cryptographic connection basically has 2 components, the "protocol" portion, and the "cipher" portion. Together these create what is called a "cipher
Oct 4, 2022 7 min read
Page 1 of 1
Prompt Critical Solutions Blog © 2025
Powered by Ghost