Skype security

Results: 118



#Item
11Computer virus / Antivirus software / Email / Password / Operating system / Skype / Security and safety features new to Windows Vista / Software / Computing / IP address

User Application for the Department Network System To Department Network Administrator: I would like to apply for the usage of the department network system as described below. As a user, I strictly recognize the system

Add to Reading List

Source URL: www.chem.s.u-tokyo.ac.jp

Language: English - Date: 2012-04-20 05:11:21
12Internet privacy / Secure communication / Public-key cryptography / Secure Real-time Transport Protocol / Encryption / Shared secret / Key / Skype security / Index of cryptography articles / Cryptography / Key management / Cryptographic protocols

Secure Calls & Messages Best practice cryptography Peer-to-peer communication Maximum security Superior voice quality

Add to Reading List

Source URL: www.crypttalk.com

Language: English - Date: 2015-02-20 10:27:12
13Social enterprise / Bookshare / Skype / Backup / Computer security / Human Rights Data Analysis Group / Software / Computing / Benetech

Partnership with Benetech, a non-profit organization that develops and supports Martus, secure information management software for human rights monitoring. 1 Benetech creates and develops new technology solutions that

Add to Reading List

Source URL: martus.org

Language: English - Date: 2015-05-18 18:07:58
14Social enterprise / Bookshare / Skype / Backup / Computer security / Human Rights Data Analysis Group / Software / Computing / Benetech

Partnership with Benetech, a non-profit organization that develops and supports Martus, secure information management software for human rights monitoring. 1 Benetech creates and develops new technology solutions that

Add to Reading List

Source URL: martus.org

Language: English - Date: 2015-02-06 14:53:45
15Voice over IP / Videotelephony / Computer network security / Internet privacy / Broadband / Skype protocol / Deep packet inspection / Tor / Traffic shaping / Software / Computing / Skype

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-08-25 10:47:50
16Computer network security / Cross-platform software / Portable software / Deep packet inspection / Communications protocol / Voice over IP / Extensible Messaging and Presence Protocol / Internet protocol suite / Skype / Software / Computing / Videotelephony

Product Datasheet Protocol and Application Plugin Library Qosmos ixEngine® is the most complete DPI engine on the market, with the ability to identify all major protocols and applications circulating on fixed and mobil

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:09
17Skype / Videotelephony / Instant messaging / Features of Skype / Skype security / Software / Computer-mediated communication / Computing

Nusoft Newsletter – IR Series No.21 Tech Overview : Recording Skype Voice Conversations Using the Internet for voice communication services is becoming increasingly widespread. One

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:26
18Videotelephony / Antivirus software / Portable software / Trend Micro Internet Security / Skype / Plug-in / Microsoft Windows / Spyware / Malware / Software / System software / Computing

Nusoft Newsletter – IR Series No.22 Tech Overview : IR Plug-In Installation Common Problems and Solutions

Add to Reading List

Source URL: www.nusoft.com.tw

Language: English - Date: 2012-10-23 00:46:26
19Skype / Android software / Web 2.0 / Voice over IP / Microsoft Lync / Skype security / Skype Technologies / Software / Videotelephony / Computing

Debian's role in establishing an alternative to Skype - Motivation, Challenges and Tactics

Add to Reading List

Source URL: fr2012.mini.debconf.org

Language: English - Date: 2015-02-18 16:30:45
20Internet Relay Chat / Cyberwarfare / Videotelephony / Ident / Distributed firewall / Firewall / Skype / Denial-of-service attack / Secure Shell / Software / Computing / Computer network security

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2012-10-04 00:45:33
UPDATE