Total record found: 161 ( Sicurezza ) Page 1 | Search for a title, author or keyword | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
IEPM (Internet End-to-end Performance Monitoring) group at SLAC (Stanford Linear Accelerator Center), Stanford University and Department of Energy (DOE). PingER (Ping End-to-end Reporting) i ...
Andy Wagoner. In order to successfully sniff packets you need to be on a LAN that is connected to a hub or a switch that has port mirroring enabled. When using packet sniffing tools, keep in ...
Ross J. Anderson, Cambridge University Computer Laboratory, 1997. Ross Anderson wrote a paper on cryptographic techniques for creating a distributed document store which is hard to censor. T ...
In the Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006. Lasse Øverlier, Norwegian Defence Research Establishment and Gjøvik University College, and Paul Syverson, ...
The Tor Project’s onion services provide a popular way of running an anonymous network service. In contrast to anonymity for clients (e.g., obfuscating a client IP address using a virtual ...
Howard Poston and Keshav Dhandhania. There are two main types of ciphers: block and stream ciphers. In a stream cipher (which are discussed in a previous post), the plaintext is encrypted on ...
Cryptanalysis is an ancient art of analyzing and breaking ciphers. It is also a relatively new modern science, which becomes more and more popular with and advent of cryptography in our ev ...
by the UK Department for Business, Energy and Industrial Strategy (BEIS). Businesses and individuals involved in commercial transactions or messaging activities need to have confidence in, ...
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch). Besides several crypt(3) ...
by Andries Brouwer. Hacking is the activity of finding out about technical details of electronic systems. That is the Science part. Curiosity. The goal is often to use this information in cr ...
By David A. Wheeler. This book provides a set of design and implementation guidelines for writing secure programs. Such programs include application programs used as viewers of remote data, ...
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Disclaimer: these links point to content provided by other sites. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Total record found: 161 ( Sicurezza ) Page 1 |