SlideShare une entreprise Scribd logo
1  sur  9
By Tomas Mujica and Sebastian Morales
what is skype Skype is a telegraph program to talk from computer 2 computer and from computer to telephone.
what is 4 Skype is program instald in your pc to talk with people for free. people can send you pages and you can find new friend. in Skype you can have video calls.
history Skype is software for making calls over the Internet, founded in 2003 by Swede Niklas Zennstrom and Dane Janus Friis, creators of Kazaa. The code and protocol of Skype are closed and proprietary, but interested users can download a free application from the official site. Skype users can talk to them for free.
Extras Security : Skype uses AES 256-bit A to encrypt voice, file transfer or an instant message. For the paid version algorithm is used 2048-bit RSA for access to voicemail and 1536-bit for negotiation when the connection. It uses a key asymmetric attacks thus avoiding man-in-the-middle.
Fuente http://es.wikipedia.org/wiki/Skype Skype program
 
 
Fin

Contenu connexe

Tendances

Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Nick - Computer Virus
Nick - Computer VirusNick - Computer Virus
Nick - Computer Virusbeacondaytech
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Warm social metrics
Warm social metricsWarm social metrics
Warm social metricsLuca Rossi
 

Tendances (13)

Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Nick - Computer Virus
Nick - Computer VirusNick - Computer Virus
Nick - Computer Virus
 
Tails os
Tails osTails os
Tails os
 
Network security
Network securityNetwork security
Network security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
security issues
security issuessecurity issues
security issues
 
Computer security
Computer securityComputer security
Computer security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Internet security
Internet securityInternet security
Internet security
 
Warm social metrics
Warm social metricsWarm social metrics
Warm social metrics
 

En vedette

Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalExinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalKevin Suitor
 
Raport IAB 2006
Raport IAB 2006Raport IAB 2006
Raport IAB 2006Divbi
 
2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W EuropieDivbi
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You Castleforce
 

En vedette (6)

Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalExinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
 
Raport IAB 2006
Raport IAB 2006Raport IAB 2006
Raport IAB 2006
 
2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie2007 Polscy Emigranci W Europie
2007 Polscy Emigranci W Europie
 
Bluebird
BluebirdBluebird
Bluebird
 
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania UniversityThe Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
The Exinda WAN Optimization Appliance - Jason Whitaker, Transylvania University
 
What You Cant See Can Hurt You
What You Cant See Can Hurt You What You Cant See Can Hurt You
What You Cant See Can Hurt You
 

Similaire à hj

LUCPHM/DPHJUL11/13/SKYPE
LUCPHM/DPHJUL11/13/SKYPELUCPHM/DPHJUL11/13/SKYPE
LUCPHM/DPHJUL11/13/SKYPELaLa LoLa
 
LUCPHM125/LNCDPHJUL1113/SKYPE
LUCPHM125/LNCDPHJUL1113/SKYPELUCPHM125/LNCDPHJUL1113/SKYPE
LUCPHM125/LNCDPHJUL1113/SKYPEAbdul Hassan
 
Final project slideshare
Final project slideshareFinal project slideshare
Final project slideshareaenteha94
 
Final project slideshare
Final project slideshareFinal project slideshare
Final project slideshareaenteha94
 
LUCPHM125/DPHJUL1113/SKYPE
LUCPHM125/DPHJUL1113/SKYPELUCPHM125/DPHJUL1113/SKYPE
LUCPHM125/DPHJUL1113/SKYPEAbdul Hassan
 
Skype for learning and teaching
Skype for learning and teachingSkype for learning and teaching
Skype for learning and teachingIvonne Pinillos
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
Teamviewer & skype
Teamviewer & skypeTeamviewer & skype
Teamviewer & skypeHashim Dar
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java PiyushPatil73
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosisP-e-t-a-r
 

Similaire à hj (20)

SKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORKSKYPE AS OVERLAY NETWORK
SKYPE AS OVERLAY NETWORK
 
LUCPHM/DPHJUL11/13/SKYPE
LUCPHM/DPHJUL11/13/SKYPELUCPHM/DPHJUL11/13/SKYPE
LUCPHM/DPHJUL11/13/SKYPE
 
LUCPHM125/LNCDPHJUL1113/SKYPE
LUCPHM125/LNCDPHJUL1113/SKYPELUCPHM125/LNCDPHJUL1113/SKYPE
LUCPHM125/LNCDPHJUL1113/SKYPE
 
Final project slideshare
Final project slideshareFinal project slideshare
Final project slideshare
 
Final project slideshare
Final project slideshareFinal project slideshare
Final project slideshare
 
LUCPHM125/DPHJUL1113/SKYPE
LUCPHM125/DPHJUL1113/SKYPELUCPHM125/DPHJUL1113/SKYPE
LUCPHM125/DPHJUL1113/SKYPE
 
Skypepresentation
SkypepresentationSkypepresentation
Skypepresentation
 
Most Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdfMost Secure Messaging Apps.pdf
Most Secure Messaging Apps.pdf
 
Skype
SkypeSkype
Skype
 
Cryptography
CryptographyCryptography
Cryptography
 
Skype for learning and teaching
Skype for learning and teachingSkype for learning and teaching
Skype for learning and teaching
 
digiCRYPT_ENG
digiCRYPT_ENGdigiCRYPT_ENG
digiCRYPT_ENG
 
Class activity 5
Class activity 5   Class activity 5
Class activity 5
 
Hacking 09 2010
Hacking 09 2010Hacking 09 2010
Hacking 09 2010
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Teamviewer & skype
Teamviewer & skypeTeamviewer & skype
Teamviewer & skype
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Pgp
PgpPgp
Pgp
 

Dernier

Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 

Dernier (20)

Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 

hj

  • 1. By Tomas Mujica and Sebastian Morales
  • 2. what is skype Skype is a telegraph program to talk from computer 2 computer and from computer to telephone.
  • 3. what is 4 Skype is program instald in your pc to talk with people for free. people can send you pages and you can find new friend. in Skype you can have video calls.
  • 4. history Skype is software for making calls over the Internet, founded in 2003 by Swede Niklas Zennstrom and Dane Janus Friis, creators of Kazaa. The code and protocol of Skype are closed and proprietary, but interested users can download a free application from the official site. Skype users can talk to them for free.
  • 5. Extras Security : Skype uses AES 256-bit A to encrypt voice, file transfer or an instant message. For the paid version algorithm is used 2048-bit RSA for access to voicemail and 1536-bit for negotiation when the connection. It uses a key asymmetric attacks thus avoiding man-in-the-middle.
  • 7.  
  • 8.  
  • 9. Fin