On Fri, Jan 18, 2013 at 12:54 AM, R.S. <[email protected]> wrote: <deleted> > c) you can use assymetric cryptography to exchange the keys. The safest way, > probably he most complicated. <deleted> Public key? Where anybody can encode with the public key, but only the private key, kept by the sender, can decode? -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all?
---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
