Network Time Protocol

Results: 810



#Item
561Network architecture / Traceroute / IP address spoofing / Ip / Ingress filtering / Reverse path forwarding / ICMP Time Exceeded / Denial-of-service attack / Internet Protocol / Computer network security / Computing / Internet

Tracefilter: A Tool for Locating Network Source Address Validation Filters ∗ USENIX Security ’07 Poster Robert Beverly

Add to Reading List

Source URL: rbeverly.net

Language: English - Date: 2007-09-18 11:32:20
562Computer network security / McAfee / Hacking / Companies listed on the New York Stock Exchange / Vulnerability / Asset / Threat / Security Content Automation Protocol / McAfee VirusScan / Computer security / Cyberwarfare / Computing

Data Sheet McAfee Vulnerability Manager Real-time, high-performance continuous asset monitoring Key Differentiators

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
563Traceroute / Network mapping / ICMP Time Exceeded / Ping / Traffic flow / Internet Protocol / Routing / Border Gateway Protocol / Router / Computing / Network architecture / Internet

Measured Impact of Crooked Traceroute Matthew Luckie Amogh Dhamdhere, kc claffy David Murrell

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2010-12-01 16:30:57
564Videotelephony / Computing / Real-time Transport Protocol / Session Initiation Protocol / Transmission Control Protocol / Push-to-talk / Internet Protocol / OSI protocols / Network architecture / Streaming

Light green indicates internal ISSI Control Function (CF) which are indicated, but not explicitly stated as to how. That is the CF must associate incoming and out going SIP calls and RTP resources. Light blue indicates T

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2009-12-15 16:28:37
565Internet standards / Network architecture / Network Time Protocol / Ntpd / Time Protocol / Kerberos / Transmission Control Protocol / Coordinated Universal Time / Synchronization / Internet protocols / Internet / Computing

Network Time Protocol (NTP): Overview and Configuration Stanislav Shalunov [removed] Performance Workshop, Atlanta, [removed]DRAFT

Add to Reading List

Source URL: e2epi.internet2.edu

Language: English - Date: 2006-08-02 12:57:44
566Network architecture / Network protocols / Computing / Precision Time Protocol / Internet protocols / Internet / Internet broadcasting / Multicast

Microsoft PowerPoint - Cohen.ppt [Kompatibilitätsmodus]

Add to Reading List

Source URL: www.ispcs.org

Language: English - Date: 2014-02-25 11:04:00
567Internet standards / Network architecture / Network Time Protocol / Ntpd / Daemon / Time server / Authentication / Email / NTP server misuse and abuse / Internet / Computing / Internet protocols

Microsoft Word - ntp-authenticate-instructions.doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-07-21 16:47:15
568Computer networking / Network architecture / Network performance / HTTP / Secure communication / Proxy server / Server / HTTP Secure / Hypertext Transfer Protocol / Computing / Internet / Internet privacy

Updated[removed] Printed[removed]Just-in-Time Pilot High Level Requirements

Add to Reading List

Source URL: www.acf.hhs.gov

Language: English - Date: 2012-07-03 10:01:47
569Synchronization / Data / Network protocols / Ethernet / Precision Time Protocol / IEEE 802 / Jitter / Bridging / Ingress / IEEE standards / Computing / Network architecture

ISPCS 2008 – International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication Ann Arbor, Michigan, September 22–26, 2008 Spider Transparent Clock John C. Eidson1, Andrew Fern

Add to Reading List

Source URL: yuba.stanford.edu

Language: English - Date: 2008-09-17 04:04:08
570Videotelephony / Computer network security / Skype / Streaming / Skype protocol / Session Initiation Protocol / Network address translation / Transmission Control Protocol / Real-time Transport Protocol / Voice over IP / Software / Computing

The Parrot is Dead: Observing Unobservable Network Communications Amir Houmansadr Chad Brubaker Vitaly Shmatikov The University of Texas at Austin

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2013-03-05 11:26:10
UPDATE