Secure Shell

Results: 1082



#Item
491Subversion / Apache Software Foundation / Apache Subversion / Collaborative software / Concurrent Versions System / Secure Shell / Ssh-keygen / Password / Comparison of Subversion clients / Software / Free software / System software

Introduction to Subversion Wesley Smith Media Arts and Technology, University of California, Santa Barbara Santa Barbara, CA 93106, USA [removed]

Add to Reading List

Source URL: www.mat.ucsb.edu

Language: English - Date: 2009-04-09 12:53:42
492Secure Shell / Meat slicer / Tiny Encryption Algorithm / Symbol

Scalable Offline Monitoring David Basin1 , Germano Caronni2 , Sarah Ereth3 , Mat´ uˇs Harvan4 , 5 3 Felix Klaedtke , and Heiko Mantel

Add to Reading List

Source URL: www.inf.ethz.ch

Language: English - Date: 2014-10-08 03:06:51
493Cryptographic software / Science / Secure Shell / European Strategy Forum on Research Infrastructures / Relevance

Horizon 2020 Work Programmes[removed]Opportunities for Researchers from the Socio-economic Sciences and Humanities (SSH) Analysis of SSH-relevant Topics

Add to Reading List

Source URL: www.europa-foerdert-kultur.info

Language: English - Date: 2014-10-16 05:35:46
494Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-05-22 23:40:41
495Network architecture / Internet standards / Secure Shell / Telnet / Transmission Control Protocol / Firewall / File Transfer Protocol / Rlogin / Ettercap / Internet / Computing / Internet protocols

Detecting Backdoors Yin Zhang and Vern Paxson∗ Abstract Backdoors are often installed by attackers who have compromised a system to ease their subsequent return to the system. We consider the problem of identifying a l

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-04-11 12:45:48
496Communications protocol / Stepping Stones / Secure Shell / Computing / Data / Information / Transmission Control Protocol

Detecting Stepping Stones Yin Zhang and Vern Paxson Abstract The problem of detecting stepping stones was first addressed in a ground-breaking paper by Staniford-Chen and

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2002-07-10 21:56:02
497Internet protocols / Network architecture / Tor / Man-in-the-middle attack / Secure Shell / Anonymizer / File Transfer Protocol / Relay / Proxy server / Internet / Computing / Internet privacy

Spoiled Onions: Exposing Malicious Tor Exit Relays∗ Philipp Winter1 , Richard Köwer3 , Martin Mulazzani2 , Markus Huber2 , Sebastian Schrittwieser2 , Stefan Lindskog1 , and Edgar Weippl2 1

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-17 19:16:31
498Literature / Cluster computing / Secure Shell / Beowulf cluster / Computer cluster / Beowulf / Computing / Film / Parallel computing

The Beowulf HOWTO Kurt Swendson 2004−05−17 Revision History

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:42
499Computing / Main function / Shellcode / Hooking / Global variable / Software engineering / Secure Shell / Password

Index Note: Page numbers followed by f, n, or t indicate figures, notes, and tables respectively.

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2014-11-14 20:21:45
500Secure Shell / Netcat / Scapy / Keystroke logging / Transmission Control Protocol / Software / System software / Computing

Conte nt s in De ta il Foreword by Charlie Miller xv

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2014-11-14 20:21:44
UPDATE