Skype security

Results: 118



#Item
71Computer network security / Internet ethics / Content-control software / Privacy / Cyberwarfare / Skype / Internet censorship / Network neutrality / Spam / Computing / Software / Internet

On Modeling the Costs of Censorship ∗ Michael Carl Tschantz UC Berkeley

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-09-11 06:26:47
72Videotelephony / Cross-platform software / Freeware / Portable software / Peer-to-peer / Voice over IP / Supernode / NAT traversal / Information security / Software / Computing / Skype

Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012

Add to Reading List

Source URL: www.ncsc.govt.nz

Language: English - Date: 2014-02-17 18:18:08
73Cryptographic hash function / Two-factor authentication / Service-oriented architecture / Electronic signature / Digital signature / Password cracking / Skype security / Cryptography / Security / Password

Microsoft Word - IDEM eAuth Success Story ks edit.docx

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-07-31 19:42:26
74Web 2.0 / Cross-platform software / Social media / Android software / Internet privacy / Facebook / Gmail / Twitter / Skype / Software / Computing / World Wide Web

OIYP and Digital Security What is ‘digital security’? Digital security can be defined as the protection of the „online self‟, meaning the assurance that the integrity and privacy of the user‟s personal data is

Add to Reading List

Source URL: oiyp.oxfam.org.au

Language: English - Date: 2012-09-25 22:32:50
75Computing / Skype security / Skype protocol / RC4 / CryptGenRandom / Cryptographic hash function / Password / Key / Peer-to-peer / Software / Cryptography / Skype

1 SKYPE SECURITY EVALUATION Tom Berson Anagram Laboratories 18 October 2005

Add to Reading List

Source URL: download.skype.com

Language: English - Date: 2010-07-12 07:17:40
76Cross-platform software / Freeware / Portable software / Skype / Web 2.0 / National Security Agency / Safe harbor / Information privacy / European Union / Software / Computing / Mass surveillance

[removed], V2 NSA: Microsoft and Skype may further transfer data from EU to US. Luxemburg DPC sees ‘adequate protection’ despite PRISM. Microsoft and Skype may continue to export data of EU citizens from the Euro

Add to Reading List

Source URL: www.europe-v-facebook.org

Language: English - Date: 2013-11-18 06:19:06
77Videotelephony / Computer network security / Skype / Streaming / Skype protocol / Session Initiation Protocol / Network address translation / Transmission Control Protocol / Real-time Transport Protocol / Voice over IP / Software / Computing

The Parrot is Dead: Observing Unobservable Network Communications Amir Houmansadr Chad Brubaker Vitaly Shmatikov The University of Texas at Austin

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-05-20 18:04:21
78Videotelephony / Android software / Web 2.0 / Teleconference / Features of Skype / Telephone call / Tru / Skype security / Software / Skype / Computing

Teleconferencing with Skype. To use the Skype system for “Skyping”, calling via telephone lines and teleconferencing you will first need to go to: www.Skype.com and download the Skype system to your PC and / or lapto

Add to Reading List

Source URL: www.iimhl.com

Language: English - Date: 2013-08-02 15:38:48
79Skype / X Window System / Goverlan Remote Administration Suite / Software / Cross-platform software / Operating system

Remote Monitoring & Infection Solutions FINSPY FinSpy is a field-proven Remote Monitoring Solution that enables Governments to face the current challenges of monitoring Mobile and Security-Aware Targets that

Add to Reading List

Source URL: wikileaks.org

Language: English - Date: 2013-09-04 13:55:14
80Videotelephony / Skype / Android software / Portable software / Freeware / E-learning / Instant messaging / Features of Skype / Skype security / Software / Computing / Computer-mediated communication

Office Hours: Bringing Them to Where Your Students Are (March[removed]Introduction Students lead busy lives; so do instructors. While institutions of higher learning require faculty members to post and keep office hours, s

Add to Reading List

Source URL: www.nactateachers.org

Language: English - Date: 2014-07-09 16:33:37
UPDATE