Computer security software

Results: 11097



#Item
701Computing / Software / System software / Computer systems / Network management / Security / Log analysis / Login / Windows Security Log / Event Viewer / Password / Logfile

Critical Log Review Checklist for Security Incidents

Add to Reading List

Source URL: www.securitywarriorconsulting.com

Language: English - Date: 2010-03-23 02:04:48
702Cyberwarfare / Computing / Computer security / Software maintenance / Software release / Patch / Computer network security / Vulnerability / Common Vulnerabilities and Exposures / Transdermal patch / Computer worm / Shavlik Technologies

Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:33
703Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
704Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Software bugs / Vulnerability / Heartbleed / Zero-day / Cross-site scripting / Security testing

Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

Add to Reading List

Source URL: info.whitehatsec.com

Language: English - Date: 2016-02-25 05:35:53
705Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:07:32
706Software / Computer architecture / System software / Computing platforms / Smartphones / Cross-platform software / Alphabet Inc. / Android / Linux namespaces / Mobile security / Kernel / Namespace

PINPOINT: Efficient & Effective Resource Isolation for Mobile Security & Privacy Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Prof. Wenliang (Kevin) Du Department of Electrical Engineering & Computer Science

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-06-05 20:26:09
707Internet privacy / Content-control software / Internet security / Internet censorship / Computer network security / Telex / Censorship / Tor / Steganography / Roman censor / Deep packet inspection / Flash proxy

Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-07-07 21:36:37
708Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2006-04-27 10:23:08
709Computer security / Security / Computer access control / Cryptography / Identity management / Cybercrime / Password / Challengeresponse authentication / Computer virus / Antivirus software / Multi-factor authentication / Password policy

“...no one can hack my mind”: Comparing Expert and Non-Expert Security Practices Iulia Ion Rob Reeder

Add to Reading List

Source URL: www.usenix.org

Language: English
710Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2010-06-11 08:24:10
UPDATE