Port security

Results: 1708



#Item
71Secure communication / Internet Standards / Internet protocols / Computer network security / Internet security / SoftEther VPN / Tor / Internet protocol suite / Transport Layer Security / Port scanner / HTTPS / File Transfer Protocol

Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

Add to Reading List

Source URL: nymity.ch

Language: English - Date: 2015-09-09 09:56:25
72Computing / Network architecture / Internet / Internet protocols / Computer network security / Internet Standards / Transmission Control Protocol / Tunneling protocols / Port knocking / SOCKS / Internet protocol suite / Port scanner

S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2007-07-26 16:56:51
73Computing / Technology / Digital media / Network telescope / Internet / Darknet / Transmission Control Protocol / Scanner / Port scanner

An Internet-Wide View of Internet-Wide Scanning Zakir Durumeric, Michael Bailey, J. Alex Halderman University of Michigan USENIX  Security  ’14      ·∙      San  Diego,  CA

Add to Reading List

Source URL: zakird.com

Language: English
74

Port Knocking and Single Packet  Authorization: Practical Deployments Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Add to Reading List

Source URL: www.cipherdyne.com

Language: English - Date: 2015-07-08 09:34:47
    75Computing / Network architecture / Computer network security / Network protocols / Computer networking / Networking hardware / Router / Server appliance / Port forwarding / Universal Plug and Play / IP address / Virtual Router Redundancy Protocol

    PDF Document

    Add to Reading List

    Source URL: cetoncorp.com

    Language: English - Date: 2013-01-17 16:01:28
    76Software / System software / Computing / Computer network security / Hacking / Wireless networking / Port scanner / Nmap / Transmission Control Protocol / Data security / Idle scan / SYN cookies

    PDF Document

    Add to Reading List

    Source URL: zmap.io

    Language: English - Date: 2014-12-10 12:42:37
    77Hacking / Software testing / Vulnerability / Image scanner / Network vulnerability scan / Social vulnerability / SAINT / Port scanner / Computer security / Computing / Cyberwarfare

    FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide   Version 1.0

    Add to Reading List

    Source URL: www.fedramp.gov

    Language: English - Date: 2015-06-03 09:58:42
    78Water / Anti-submarine warfare / Technology / Security / Underwater Port Security System / Surveillance Towed Array Sensor System / Sonar / Diving equipment / Acronyms

    DISCOVER THE UNKNOWN Multipurpose Sonar SUBEYE Safety and Security for Mega Yachts and Cruise Ships

    Add to Reading List

    Source URL: www.elac-nautik.de

    Language: English - Date: 2010-08-31 11:09:59
    79Water / Water transport / International relations / International Convention for the Safety of Life at Sea / STCW / International Ship and Port Facility Security Code / Maritime Security Regimes / Piracy / Maritime security / Law of the sea / Transport / International Maritime Organization

    IMO What it is OMI Ce qu’elle est OMI Qué es 4 Albert Embankment London SE1 7SR

    Add to Reading List

    Source URL: www.fidena.gob.mx

    Language: English - Date: 2014-12-05 18:34:03
    80

    Scoping Comments Liberty LNG – USCGnation. The Draft EIS must take these shortages into account when analyzing and examining the potential national security impact of Port Ambrose.

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
      UPDATE