Skype protocol

Results: 85



#Item
21Silver Needle in the Skype

Silver Needle in the Skype

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:26
22Silver Needle in the Skype

Silver Needle in the Skype

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:26
23Videotelephony / Android software / Broadband / VoIP phone / Vishing / Caller ID spoofing / VoIP spam / Skype / Tru / Software / Voice over IP / Computing

VoIP Security Executive Summary Voice over Internet Protocol (VoIP) systems are attractive targets for cyber criminals and other actors with malicious intent. Yet they are regularly overlooked by defenders, especially s

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-18 20:00:33
24G U I D E  VoIP Security Executive Summary Voice over Internet Protocol (VoIP) systems are attractive targets for cyber criminals and other actors with malicious intent. Yet they are regularly overlooked by defenders, es

G U I D E VoIP Security Executive Summary Voice over Internet Protocol (VoIP) systems are attractive targets for cyber criminals and other actors with malicious intent. Yet they are regularly overlooked by defenders, es

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-19 01:18:37
25arXiv:submit[removed]cs.CR] 14 May[removed]ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship Philipp Winter

arXiv:submit[removed]cs.CR] 14 May[removed]ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
26I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users’ Privacy Stevens Le Blond∗ Chao Zhang† Arnaud Legout‡ Keith Ross† Walid Dabbous‡ ∗  MPI-SWS, Germany

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users’ Privacy Stevens Le Blond∗ Chao Zhang† Arnaud Legout‡ Keith Ross† Walid Dabbous‡ ∗ MPI-SWS, Germany

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-10-16 12:32:37
27Understanding Computer Usage Evolution David C. Anastasiu†1 , Al M. Rashid‡ , Andrea Tagarelli§ and George Karypis†2 † University of Minnesota, Twin Cities, MN 55455, U.S.A. ‡ Intel Corporation, 1900 Prairie C

Understanding Computer Usage Evolution David C. Anastasiu†1 , Al M. Rashid‡ , Andrea Tagarelli§ and George Karypis†2 † University of Minnesota, Twin Cities, MN 55455, U.S.A. ‡ Intel Corporation, 1900 Prairie C

Add to Reading List

Source URL: glaros.dtc.umn.edu

Language: English - Date: 2015-04-14 19:06:02
28NewTek TalkShow Advanced Network Tips

NewTek TalkShow Advanced Network Tips

Add to Reading List

Source URL: newtek.com

Language: English - Date: 2015-02-10 19:51:26
29IT Administrators Guide Skype™ for Windows® version 4.2 Version 2.0 Copyright © Skype Limited 2010

IT Administrators Guide Skype™ for Windows® version 4.2 Version 2.0 Copyright © Skype Limited 2010

Add to Reading List

Source URL: az545221.vo.msecnd.net

Language: English - Date: 2014-02-28 12:08:05
30NSE-OFFLINE DATA FEED  Version: 1.1 Date: November 30, 2012  DOTEX INTERNATIONAL LIMITED

NSE-OFFLINE DATA FEED Version: 1.1 Date: November 30, 2012 DOTEX INTERNATIONAL LIMITED

Add to Reading List

Source URL: www.nseindia.com

Language: English - Date: 2013-02-14 15:34:28