Hijacking

Results: 635



#Item
191Network architecture / Country code top-level domains / Domain name / Identifiers / .au / Whois / Domain hijacking / Domain name registrar / Domain name system / Internet / Internet in Australia

auDA PUBLISHED POLICY Policy Title: TRANSFERS (CHANGE OF REGISTRANT) POLICY Policy No: Publication Date: Status: Current

Add to Reading List

Source URL: auda.org.au

Language: English - Date: 2014-09-01 22:09:48
192Computing / Extension mechanisms for DNS / TUN/TAP / Covert channel / Name server / DNS hijacking / Domain name system / Internet / Network architecture

Covert Channels inside DNS Lucas Nussbaum Lucas Nussbaum Covert Channels inside DNS

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
193Security / Secure communication / Internet standards / Computer network security / Transport Layer Security / Password / Public-key cryptography / HTTP Secure / Session hijacking / Cryptography / Cryptographic protocols / Computing

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-01-25 08:24:32
194Propaganda / United States Congress / Ethics / AB / Behavior / Business / No-kill shelter / Accountability / Freedom of information legislation / Humane Society of the United States

Sneaking the “Big Lie” through the Back Door: How Special Interest Groups are Hijacking Local Legislation Margaret Anne Cleek California State University, Sacramento Richard Guarino California State University, Sacra

Add to Reading List

Source URL: spcpo.homestead.com

Language: English - Date: 2009-01-15 22:31:37
195Routing / Internet protocols / Internet standards / Computer networking / Border Gateway Protocol / IP hijacking / Router / Routing protocol / Route filtering / Network architecture / Internet / Computing

Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin Stephanie Forrest

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2006-09-02 13:54:00
196Due Process Clause / Fourteenth Amendment to the United States Constitution / Equal Protection Clause / Substantive due process / United States v. Cruikshank / Plessy v. Ferguson / Santa Clara County v. Southern Pacific Railroad / Separate but equal / Slaughter-House Cases / United States Constitution / Law / Case law

The Hijacking of the Fourteenth Amendment By Doug Hammerstrom Constitutional Law courses in law schools teach that the Fourteenth Amendment defines the limit beyond which state legislation may not impinge on property rig

Add to Reading List

Source URL: reclaimdemocracy.org

Language: English - Date: 2012-07-17 18:15:46
197Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / IP-VPN Lite / Network architecture / Internet / Computing

ISP Workshop Lab Module 7 – BGP route filtering and advanced features Objective: Using the network configured in Module 6, use various configuration methods on BGP peerings to demonstrate neighbour filtering and more

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2014-11-17 21:56:28
198Political geography / International relations / Earth / Monarchy of Antigua and Barbuda / Offence against the person / Antigua and Barbuda / Assault

LAWS OF ANTIGUA AND BARBUDA (CAP. 200 Hijacking

Add to Reading List

Source URL: www.laws.gov.ag

Language: English - Date: 2008-01-29 18:30:04
199Whois / ICANN / Domain sniping / .org / Domain hijacking / Domain name registrar / Domain name system / Internet / Domain name

dotkoeln registry NetCologne | Postfach | 50779 Köln Abuse Prevention and Mitigation Policies for the TLD .koeln I.

Add to Reading List

Source URL: dot.koeln

Language: English - Date: 2014-03-25 11:48:26
200Computing / Cybersquatting / Anticybersquatting Consumer Protection Act / Reverse domain hijacking / Uniform Domain-Name Dispute-Resolution Policy / Trademark / Domain name / Domain hijacking / Domain name system / Internet / Law

Microsoft Word - Answer and Counterclaim - Carpenter v. Original Web Ventures.doc

Add to Reading List

Source URL: domainnamewire.com

Language: English - Date: 2015-04-09 14:55:05
UPDATE