HTTP Secure

Results: 1425



#Item
671Cryptographic protocols / Secure communication / System software / Microsoft CryptoAPI / Man-in-the-middle attack / Hooking / Dynamic-link library / HTTP Secure / Computing / Software / Cryptographic software

New reverse engineering technique using API hooking and sysenter hooking, and capturing of cash card access NetAgent Co., Ltd. http://www.netagent.co.jp Kenji Aiko 

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:32
672System software / Cryptographic protocols / Secure communication / Internet protocols / Internet standards / IFolder / Novell / HTTP Secure / Transport Layer Security / Software / Computing / Novell NetWare

Novell iFolder[removed]Security Administration Guide

Add to Reading List

Source URL: www.novell.com

Language: English - Date: 2014-01-28 12:54:22
673Computer security / Security token / HTTP Secure / Password / Authentication / Security / Cryptographic protocols / HTTP

In Carnegie Mellon Computer Science: A 25-Year Commemorative, ed. R. Rashid. ACM Press and Addison-Wesley, 1991, pp[removed]Note: The first printing of this volume had incorrect text due to a production error.) 7 Stro

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:50:43
674Databases / Datasource / HTTP / Information / Secure communication / HTTP Secure / Load balancing / Computing / Computer networking / Data

Caplin Liberator 6.0 Administration Guide September 2012 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 What this document contains . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.caplin.com

Language: English - Date: 2014-02-13 06:37:56
675HTTP / Computer security / Computer network security / Secure communication / Internet standards / Transport Layer Security / Digest access authentication / Basic access authentication / Password / Security / Computing / Cryptographic protocols

UNC School of Medicine  Web Publishing Security Policy  Overview  The World Wide Web (WWW) is a key strategic resource for communication, teaching, research  and administration and plays a vita

Add to Reading List

Source URL: www.med.unc.edu

Language: English - Date: 2008-03-24 11:00:55
676System software / Railgun / Memcached / Dpkg / Iptables / HTTP Secure / Software / Computing / Spacecraft propulsion

Railgun quick start for Optimized Partners This document exists as a basic guide for Optimized Partners to get Railgun up and running. Overview This will not cover all network topologies and configuration types. Full det

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2015-02-20 21:31:04
677Portable software / Webroot Software / HTTP Secure / Email / IP address / World Wide Web / Opera / Software / Computing / HTTP

SecureAnywhere Web Security Service TM This document details the general steps, in order of execution to deploy the Webroot SecureAnywhere Web Security Service, using the Desktop Web Proxy (DWP)

Add to Reading List

Source URL: download.webroot.com

Language: English - Date: 2014-06-27 12:54:25
678CAcert.org / Cryptographic protocols / Key management / Secure communication / HTTP Secure / Public key certificate / Email / X.509 / Robot certificate authority / Cryptography / Public-key cryptography / Certificate authorities

Press release Secure emails with certificates from CAcert Secure sending and receiving of email is currently highly demanded. There are a number of paid services nowadays offering pseudo-secure (which turns finally out t

Add to Reading List

Source URL: blog.cacert.org

Language: English - Date: 2014-03-10 13:30:57
679Auditing / Public-key cryptography / Secure communication / Certificate authority / Audit / HTTP Secure / Internal audit / Cryptography / CAcert.org / Key management

Press release CAcert appoints internal auditor CAcert gets down to business to the next step for reopening the audit process and has appointed Benedikt Heintel as internal auditor in last december. The goal is the accept

Add to Reading List

Source URL: blog.cacert.org

Language: English - Date: 2014-03-27 03:16:06
680Computer security / Cross-platform software / Buffer overflow / HTTP cookie / C / Stack / Computing / Software engineering / Software bugs

Writing Secure Applications in Scheme Win Treese Serissa Research, Inc. [removed] 13 October 2003

Add to Reading List

Source URL: www.treese.org

Language: English - Date: 2003-12-27 12:57:42
UPDATE