và các thiết bị chuyển mạch / l. Sau đó có e-mail tập tin cho bạn như là một tập tin đính kèm. Đây là một cách tuyệt vời để bắt đầu xử lý sự cố mà không cần phải hỏi rất nhiều câu hỏi của một người có thể có sự hiểu biết biên của các hệ thống con kết nối mạng của máy. | How to Cheat at Securing Windows 2000 TCP IP employed by the client and the session key. The session key is encrypted with the server s public key which the server sent earlier in the server Hello message . 5. The client sends a client finished message indicating that all communications from this point forward are secure. Almost all messages to this point have been sent in clear text implying that anyone listening in on the conversation would be able to read all parts of the exchange. This is not a problem since no Information other than the session key is secret. Moreover the session key is safe because it is encrypted with the server s public key. Only the server is able to decrypt the session key by using its private key. The next series of events takes place in a secure context. 1. The server sends a server verify message to the SSL client. This message verifies that the server is indeed the server with which the client wishes to communicate. The server verify message contains the challenge message the client sent earlier in the conversation. The server encrypts the challenge message with the session key. Only the legitimate server has access to the session key. When the client decrypts the challenge message encrypted with the session key and it matches that sent in the challenge then the server has verified itself as the legitimate partner in the communication. 2. The last message used to set up the secure SSL channel is the server finish message. The SSL server sends this message to the SSL client informing of its readiness to participate in data transmission using the shared session key. The SSL session setup is complete and data passes through a secure SSL channel. The setup procedure is dependent on several security technologies including public key encryption symmetric encryption asymmetric encryption message hashing and certificates. In the following sections we define these terms and see how SSL uses them to create a secure channel. Symmetric and .