Posted monthly, this FAQ provides details about this brand of encryption named after the three-headed dog who guarded the entrance to Hades.
Consult the official documentation for this network-authentication protocol available from MIT.
Get the basics about this encryption tool, find user and programming resources and distribution, and Kerberos-compatible software.