Browser security

Results: 417



#Item
221Secure communication / Phishing / Social engineering / Spamming / Firefox / Google Chrome / Transport Layer Security / Malware / Extended Validation Certificate / Software / Portable software / Web browsers

Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe University of California, Berkeley\ast [removed]

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2013-09-13 05:21:46
222Rogue software / Scareware / Spyware / Computer network security / Kazaa / Keystroke logging / Browser hijacker / Computer virus / WinFixer / Malware / Espionage / System software

A Crawler-based Study of Spyware on the Web Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy Department of Computer Science & Engineering University of Washington {anm, tbragin, gribble, levy}@cs.wa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:38:52
223Secure communication / Cryptographic protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Public key certificate / Certificate authority / X.509 / GnuTLS / Cryptography / Public-key cryptography / Key management

The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Martin Georgiev Subodh Iyengar

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-10-13 15:43:00
224Sociology / Evaluation methods / Impact assessment / United States Agency for International Development / Impact evaluation / Food security / Food and Agriculture Organization / Evaluation / Food politics / Food and drink

December 1, 2005 The URL for each evaluation listed below must be copied into your web browser in the following way: [removed])

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 03:33:55
225Remote administration software / Motherboard / PC Card / PCMCIA / Citrix XenApp / Independent Computing Architecture / Universal Serial Bus / Mouse / Computer hardware / Remote desktop / Computing

Wyse Linux Adaptable Security and Flexibility for Thin Computing Wyse Linux delivers the flexibility to run Citrix ICA or Microsoft RDP, a local browser or terminal emulation, even local X Window applications. With expan

Add to Reading List

Source URL: www.vecmar.com

Language: English - Date: 2007-08-16 14:18:24
226Electronic commerce / Secure communication / Internet standards / CA/Browser Forum / Extended Validation Certificate / Public key certificate / Certificate authority / Transport Layer Security / X.509 / Cryptography / Key management / Public-key cryptography

SwissSign SSL Zertifikate englisch

Add to Reading List

Source URL: www.swisssign.com

Language: English - Date: 2013-09-30 05:37:45
227Rogue software / Scareware / MS Antivirus / Rogue security software / Malware / System software / Antivirus software

The Challenge of Preventing Browser-Borne Malware Sponsored by Spikes Security Independently conducted by Ponemon Institute LLC Publication Date: February 2015

Add to Reading List

Source URL: learn.spikes.com

Language: English - Date: 2015-01-30 12:19:36
228Portable software / Graphics file formats / Web development software / Add-on / Adobe Shockwave Player / Shockwave / Firefox / Web page / Norton Internet Security / Software / Proprietary software / News aggregators

The Shockwave Player Browser: Mozilla Firefox For the Gizmos on ExploreLearning.com (EL) to operate successfully, Shockwave v10.0 or higher is required. However, we strongly recommend using the latest version [v11.5.x.xx

Add to Reading List

Source URL: cs.explorelearning.com

Language: English - Date: 2011-02-24 15:36:30
229Password / Software / Computing / Tenable Network Security / Nessus / Vulnerability scanner

Passive Vulnerability Scanner Key Upload After installing PVS and starting the PVS services, open a browser and connect to https://:8835. The default username is “admin” and the initial passwor

Add to Reading List

Source URL: static.tenable.com

Language: English - Date: 2014-10-08 15:20:08
230Tenable Network Security / Nessus / Software

SecurityCenter Key Upload If SecurityCenter is already installed and the setup wizard completed, save the key file to the local hard drive of the system you will be using to access SecurityCenter via a web browser and fo

Add to Reading List

Source URL: static.tenable.com

Language: English - Date: 2014-10-08 15:44:30
UPDATE