Hijacking

Results: 635



#Item
51Domain name system / WHOIS / Domain name registrar / Domain name / ICANN / Information privacy / Medical privacy / Domain hijacking

Data Protection and Privacy Policy_FINAL_26 Feb 2014

Add to Reading List

Source URL: nic.accountant

Language: English - Date: 2016-05-19 06:25:01
52Computing / Domain name system / Internet / Network architecture / Internet privacy / Computer network security / DNS hijacking / Hacking / Transmission Control Protocol / Proxy server / CNAME record / Captive portal

On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
53Transport / Business / Watercraft / Oil tanker / Tankers / Piracy / Chemical tanker / Terrorism in Malaysia / MT Zafirah hijacking / Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia

A joint project by: GUIDE FOR TANKERS OPERATING IN ASIA AGAINST PIRACY AND ARMED ROBBERY INVOLVING OIL CARGO THEFT

Add to Reading List

Source URL: www.recaap.org

Language: English - Date: 2015-11-25 20:59:05
54Domain name system / DNS hijacking / Domain name registrar / Name server / IID

PRODUCT INTELLIGENCE ACTIVELY SECURING THE EXTENDED ENTERPRISE 1142 Broadway – Suite

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-02-06 12:31:20
55

Political Hashtag Hijacking in the U.S. Asmelash Teka Hadgu Kiran Garimella Ingmar Weber

Add to Reading List

Source URL: www2013.org

Language: English - Date: 2014-07-21 08:47:00
    56Routing protocols / Internet Standards / Internet protocols / Border Gateway Protocol / Routing / Router / IP hijacking / Resource Public Key Infrastructure

    BGP Policy violations in the data-plane Pierre Francois, Institute IMDEA Networks Paolo Lucente, PMACCT

    Add to Reading List

    Source URL: www.pmacct.net

    Language: English - Date: 2011-11-01 05:09:41
    57Computing / Network performance / Computer networking / Internet privacy / Distributed data storage / Telecommunications engineering / Transmission Control Protocol / Content delivery network / Facebook / Internet / Server / DNS hijacking

    Exploiting Locality of Interest in Online Social Networks Mike P. Wittie, Veljko Pejovic, Lara Deek, Kevin C. Almeroth, Ben Y. Zhao Department of Computer Science University of California, Santa Barbara {mwittie, veljko,

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2010-11-02 09:02:20
    58Identity documents / Domain name system / Internet Standards / Internet protocols / Internet privacy / Personally identifiable information / Privacy / HTTP cookie / Password / DNS hijacking / Google Public DNS

    Privacy Policy DNS Made Easy values your privacy. Please read the following document carefully as this is the official policy in force at the present time. The policy listed below outlines how DNS Made Easy handles priva

    Add to Reading List

    Source URL: www.dnsmadeeasy.com

    Language: English - Date: 2015-12-08 13:37:24
    59

    CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Long Lu† † Zhichun Li‡

    Add to Reading List

    Source URL: wenke.gtisc.gatech.edu

    Language: English - Date: 2014-03-13 19:06:41
      60Twitter / Computing / Social media / Software / Information science / Web 2.0 / Computer jargon / Hashtag / Knowledge representation / Twitter usage / Barack Obama on social media

      Political Hashtag Hijacking in the U.S. Asmelash Teka Hadgu Kiran Garimella Ingmar Weber

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:47:00
      UPDATE