Hijacking

Results: 635



#Item
601Transport / Shipping / Maersk Alabama hijacking / Presidency of Barack Obama / Richard Phillips / MV Maersk Alabama / Piracy / Maersk / Piracy in Somalia / Humanitarian aid / Watercraft

Microsoft Word - BTB Maersk Line Press Release _4.27.09_.docx

Add to Reading List

Source URL: www.terrybryant.com

Language: English - Date: 2012-10-15 15:43:02
602Tokyo Convention / Transport / Criminal jurisdiction / Aircraft hijacking / Piracy Act / Law / Aviation law / Aviation

Microsoft Word - Document1

Add to Reading List

Source URL: treaties.un.org

Language: English - Date: 2008-10-09 13:49:33
603Network architecture / Computer network security / Hacking / Internet ethics / DNS hijacking / Internet privacy / Name server / Malware / Zlob trojan / Domain name system / Computing / Internet

DNSChanger Malware DNS (Domain Name System) is an Internet service that converts user-friendly domain names into the numerical Internet protocol (IP) addresses that computers use to talk to

Add to Reading List

Source URL: www.fbi.gov

Language: English
604Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Router / Multihoming / Computer network / Network architecture / Internet / Computing

How Secure are Secure Interdomain Routing Protocols? Sharon Goldberg Microsoft Research

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-06-27 16:10:03
605Humanitarian aid / Contemporary history / International criminal law / Gulf of Aden / Maersk Alabama hijacking / MV Maersk Alabama / Spanish frigate Victoria / Action of 1 April / INS Tabar / Piracy in Somalia / Piracy / Watercraft

(U) SOMALIA: Factors Influencing Attacks and Forecast of Pirat

Add to Reading List

Source URL: www.marad.dot.gov

Language: English - Date: 2011-02-01 22:29:09
606Domain name / Domain hijacking / Domain registration / Domain name system / Internet / Network architecture

TERMS AND CONDITIONS OF REGISTRATION Applicable for the top-level domain .se from June 3, 2013 (The Swedish version of these terms and conditions shall prevail)

Add to Reading List

Source URL: www.iis.se

Language: English - Date: 2013-09-02 04:02:26
607Routing protocols / Routing / Internet protocols / Internet standards / Border Gateway Protocol / IP hijacking / Router / Default-free zone / Path vector protocol / Network architecture / Internet / Computing

CONTRIBUTED P A P E R

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-01-15 18:56:25
608Domain name / Top-level domain / .bm / Country code top-level domain / Domain / Domain name registrar / Domain hijacking / Domain name system / Internet / Network architecture

BERMUDANIC DOMAIN NAME RULES

Add to Reading List

Source URL: www.bermudanic.bm

Language: English - Date: 2012-07-17 12:37:45
609HTTP / Network protocols / Computer network security / HTTP cookie / Internet privacy / Session hijacking / Session fixation / Cross-site scripting / Session management / Computing / Cyberwarfare / Computer security

PUBLIC Session Fixation Vulnerability in Web-based Applications

Add to Reading List

Source URL: www.acros.si

Language: English - Date: 2010-04-13 10:57:03
610Network architecture / Name server / DNS spoofing / Domain Name System Security Extensions / DNS zone / DNS hijacking / OpenDNS / Captive portal / Time to live / Domain name system / Internet / Computing

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority David Dagon1 Niels Provos2

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2008-02-15 01:18:50
UPDATE