As the size and popularity of the Internet has grown, so has the threat from communication interception. Over the years, tools have been developed to encrypt communications as they are transferred over the network.
Red Hat Enterprise Linux ships with two basic tools that use high-level, public-key-cryptographybased encryption algorithms to protect information as it travels over the netw...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.