DNS spoofing

Results: 244



#Item
31Talking to Yourself for Fun and Profit Lin-Shung Huang∗ , Eric Y. Chen∗ , Adam Barth† , Eric Rescorla‡ and Collin Jackson∗ ∗ Carnegie Mellon University, {linshung.huang, eric.chen, collin.jackson}@sv.cmu.edu

Talking to Yourself for Fun and Profit Lin-Shung Huang∗ , Eric Y. Chen∗ , Adam Barth† , Eric Rescorla‡ and Collin Jackson∗ ∗ Carnegie Mellon University, {linshung.huang, eric.chen, collin.jackson}@sv.cmu.edu

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
32DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
33Survivable Key Compromise in Software Update Systems ∗ Justin Samuel  UC Berkeley

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2010-08-18 22:10:28
34DNSBOX200 ULTRA-SECURE, HIGH PERFORMANCE DNS/DHCP SERVER DNSBOX200 is a DNS slave, recursive resolver (DNS cache) and DHCP server for premium performance and security needs. This is a flexible appliance, which can be lic

DNSBOX200 ULTRA-SECURE, HIGH PERFORMANCE DNS/DHCP SERVER DNSBOX200 is a DNS slave, recursive resolver (DNS cache) and DHCP server for premium performance and security needs. This is a flexible appliance, which can be lic

Add to Reading List

Source URL: www.appliansys.com

Language: English - Date: 2014-12-08 07:08:24
35Strange Things Found in an Open Resolver Survey Duane Wessels The Measurement Factory/CAIDA  WIDE+CAIDA Workshop #9

Strange Things Found in an Open Resolver Survey Duane Wessels The Measurement Factory/CAIDA WIDE+CAIDA Workshop #9

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:57
36THE PERILS OF USING THE DOMAIN NAME SYSTEM TO ADDRESS UNLAWFUL INTERNET CONTENT September 2011 Governments and law enforcement agencies are increasingly grappling with how best to address unlawful content and activity on

THE PERILS OF USING THE DOMAIN NAME SYSTEM TO ADDRESS UNLAWFUL INTERNET CONTENT September 2011 Governments and law enforcement agencies are increasingly grappling with how best to address unlawful content and activity on

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2011-10-13 10:07:49
37Lecture 17: DNS and the DNS Cache Poisoning Attack Lecture Notes on “Computer and Network Security” by Avi Kak () March 24, 2015

Lecture 17: DNS and the DNS Cache Poisoning Attack Lecture Notes on “Computer and Network Security” by Avi Kak () March 24, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-24 11:44:09
38DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs)   http://www.nlnetlabs.nl/

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
39DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
40DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0  ∗

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10