Computer port

Results: 1743



#Item
581System software / Secure Shell / Port knocking / Firewall / Nmap / Vulnerability / OpenSSH / Exploit / Stateful firewall / Software / Computer network security / Computing

Advances In Single Packet Authorization Michael Rash Enterasys Networks, Inc. http://www.cipherdyne.org/ ShmooCon

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
582Out-of-band management / Serial port / Finder / Computer / Computing / System software / Mac OS / Software

Microsoft Word - Instruction for upgrading software.doc

Add to Reading List

Source URL: www.satking.com.au

Language: English - Date: 2013-11-10 17:26:14
583Laptop / Personal computing / VGA connector / Fn key / Computer keyboard / Laptops / Computer hardware / Computing / Electronic engineering

Epson Data Projector and Slide Presenter Power On/Off Switch All Microsoft Windows laptops have an external monitor port (VGA) - it is blue with

Add to Reading List

Source URL: www.queens.ox.ac.uk

Language: English - Date: 2012-12-15 16:29:03
584Central processing unit / Coprocessor / IBM Personal Computer / Programmable logic controller / RS-232 / Serial port / Home computers / Personal computers / Technology / Computing / Computer hardware

CoProcessor Module Features Triple-port BASIC CoProcessor F2-CP128 <--->

Add to Reading List

Source URL: users.obs.carnegiescience.edu

Language: English - Date: 2009-09-25 15:59:26
585Open standards / Standards organizations / Ethernet / CompactPCI / Standards / Gigabit Ethernet / PICMG / Serial ATA / PCI Express / Computer hardware / Computer buses / OSI protocols

Product Information CompactPCI ® Serial • SL1-COMBO 7-Port Gigabit Ethernet Switch Document No. 7678 • 9 February 2015

Add to Reading List

Source URL: www.ekf.de

Language: English - Date: 2015-02-09 10:20:16
586Network architecture / Internet privacy / Computer networking / Internet standards / Network performance / Telnet / Proxy server / Secure Shell / Port / Computing / Internet / Internet protocols

Secure Proxy Server Installation Guide Copyright © 2006 by Connect, Inc. All rights reserved. This document may not be reproduced in full or in part, in any form, without prior written permission of Connect Inc., 1701

Add to Reading List

Source URL: www.connectrf.com

Language: English - Date: 2007-11-26 11:24:08
587Computer graphics / Image scanner / Pixel / Computing / Technology / Office equipment / Digital photography / Universal Serial Bus

ScanShell 800R A6 OCR Simplex Scanner The mobile A6 Scanshell® 800R sheet-fed twain compatible color scanning device which interfaces to any standard USB port. It is the scanning solution of Photo, Business Card, Bank C

Add to Reading List

Source URL: www.id-reader.com

Language: English - Date: 2015-02-05 05:24:50
588Electronics / Computer-mediated communication / Siemens Enterprise Communications / Siemens Communications / Session Initiation Protocol / VoIP phone / 3pcc / Session border controller / Voice over IP / Siemens / Videotelephony / Electronic engineering

Information Siemens Enterprise Communications is known worldwide as a trailblazer in the advancement of information and communication technologies. No other company offers such a comprehensive and innovative product port

Add to Reading List

Source URL: www.netcom-activ.ro

Language: English - Date: 2012-02-19 04:38:34
589Internet / Internet protocols / TCP/IP / Berkeley sockets / Port / Internet protocol suite / Transmission Control Protocol / Computer networking / User Datagram Protocol / Computing / Network socket / Network architecture

20 Distributed Programming With distributed programming, you can build applications running on several machines that work together through a network to accomplish a task. The computation model described here is parallel

Add to Reading List

Source URL: caml.inria.fr

Language: English - Date: 2011-11-23 02:41:37
590SQL / SQL injection / Port scanner / Computing / Transmission Control Protocol / Computer network security / Microsoft SQL Server / Microsoft Data Access Components / Computer security / Cyberwarfare / Data management

M$SQL Sql Injection Thinking DM Wang[removed]Chroot Meeting

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2004-10-16 13:51:12
UPDATE