Personal firewall

Results: 75



#Item
1

Revealing Hidden Context: Improving Mental Models of Personal Firewall Users Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov University of British Columbia, Vancouver, Canada {fahimehr,hawkey,beznosov}@ece.ubc.ca

Add to Reading List

Source URL: cups.cs.cmu.edu

- Date: 2009-05-29 11:14:56
    2One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

    Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2007-06-08 09:53:29
    3Computer network security / Computer security / Cyberwarfare / Computing / Personal firewall / Firewall / Jump server / Distributed firewall / Comparison of firewalls

    AppGate Distributed Device Firewall – Datasheet AppGate® Distributed Device Firewall Protecting user devices and the network

    Add to Reading List

    Source URL: www.cryptzone.com

    Language: English - Date: 2015-04-28 16:57:36
    4

    DATA SECURITY MANAGEMENT PERSONAL FIREWALL SHOWDOWN: SOFTWARE

    Add to Reading List

    Source URL: www.ittoday.info

    Language: English - Date: 2012-10-26 11:49:18
      5Computing / Data security / Firewall / Rootkit / Personal firewall / Distributed firewall / Application firewall / Computer network security / Cyberwarfare / Computer security

      Introduction Current personal firewalls are focused on combating usermode malware What about protection against rootkits?

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:51:42
      6Embedded Linux / Smartphones / Firewall / ESET / Internet privacy / Software / Computing / Computer network security / Android

      Cyber Hygiene Doing your part to stay safer online. TOP TEN PERSONAL COMPUTER SAFETY TIPS

      Add to Reading List

      Source URL: securingourecity.org

      Language: English - Date: 2015-05-25 02:22:28
      7Computer network security / Internet protocols / Internet standards / Internet security / Distributed firewall / Firewall / File Transfer Protocol / Secure Shell / Telnet / Computing / Internet / Network architecture

      Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

      Add to Reading List

      Source URL: www.wilyhacker.com.

      Language: English - Date: 2004-11-16 15:11:46
      8Firewall / Computing / Computer security / Distributed firewall / Application firewall / Computer network security / Security / Cyberwarfare

      Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

      Add to Reading List

      Source URL: www.wilyhacker.com.

      Language: English - Date: 2004-11-16 15:11:46
      9Network protocols / Digital media / Mobile content / Universal Plug and Play / Access control / Peer-to-peer / Firewall / Computing / Security / Technology

      MyNet: a Platform for Secure P2P Personal and Social Networking Services D. N. Kalofonos1, Z. Antoniou1, F. D. Reynolds1, M. Van-Kleek2, J. Strauss2, and P. Wisner1 1 Nokia Research Center Cambridge (NRCC), Cambridge, MA

      Add to Reading List

      Source URL: pdos.csail.mit.edu

      Language: English - Date: 2009-11-10 14:15:06
      10Computing / Discontinued software / Firestarter / GTK+ / Firewall / Personal firewall / Internet Connection Sharing / Operating system / Computer network security / System software / Computer security

      Firestarter User’s Manual[removed]http://www.fs-security.com Index

      Add to Reading List

      Source URL: www.fs-security.com

      Language: English - Date: 2005-01-07 12:24:06
      UPDATE