EN
In this paper we present public key cryptosystems. We also talk about cryptosystem which to base on elliptic curve. In 4 part we present how to use ZT-UNITAKOD method to dynamic code. Finally, we discuss the ways to protect the internet user from phishing.