Spoofing

Results: 545



#Item
181SMS / Text messaging / Iridium Communications / Roaming / Tru / Hutchison 3G / GSM services / SMS spoofing / Technology / Mobile technology / Wireless

Page 1 of 2 2015_3 CRITICAL INFORMATION SUMMARY PIVOT 40 PLAN (IRIDIUM NETWORK)

Add to Reading List

Source URL: www.pivotel.com.au

Language: English - Date: 2015-03-31 22:19:17
182Videotelephony / Broadband / Skype / Caller ID spoofing / Mobile VoIP / VoIP phone / Software / Voice over IP / Computing

VoIP Security Methodology and Results NGS Software Ltd Barrie Dempster – Senior Security Consultant

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
183Telecommunications / Call forwarding / Vertical service code / Telephone call / Dial tone / 9-1-1 / Voice over IP / Call waiting / Caller ID spoofing / Telephony / Electronic engineering / Caller ID

VoIP Services User Guide Table of Contents Overview of Services

Add to Reading List

Source URL: www.tbwifi.ca

Language: English - Date: 2011-05-20 16:36:59
184Computer-mediated communication / Conversation threading / Information overload / Yahoo! Mail / Gmail / Email spoofing / Email / Computing / Internet

arXiv:1504.00704v1 [cs.SI] 2 AprEvolution of Conversations in the Age of Email Overload Farshad Kooti Luca Maria Aiello

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-04-05 20:39:33
185Spamming / Deception / Virus hoaxes / Internet memes / Chain letter / Hoax / Phishing / Email spoofing / Computer virus / Email / Internet / Computing

Identifying Hoaxes A CyberAngels Quick Tutorial Adapted from the US Computer Emergency Readiness Team Hoaxes and Chain Letters

Add to Reading List

Source URL: www.cyberangels.org

Language: English - Date: 2008-06-01 11:41:11
186Phishing / Password / Computing / Transaction authentication number / Malware / Crypt / Website spoofing / Computer security / Social engineering / Spamming / Internet

Some open problems with RIPA Pt.3 Caspar Bowden (Director FIPRScrambling for Safety - 14th Augustthis presentation reflects personal views only)

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-08-16 07:52:32
187Computing / DNS spoofing / Domain Name System Security Extensions / DNS zone / Name server / Anycast / Domain name / Comparison of DNS server software / Split-horizon DNS / Domain name system / Internet / Network architecture

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:52
188Certificate authority / Transport Layer Security / Code signing / Public key certificate / Public key infrastructure / Key size / DNS spoofing / Dynamic SSL / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2012-09-11 18:21:26
189Network architecture / Computing / Internet standards / Key management / DNSSEC / Domain Name System Security Extensions / Verisign / DNS spoofing / Internet / Domain name system / Internet protocols

Verifying Keys through Publicity and Communities of Trust 
 " Eric Osterweil! Dan Massey! Danny McPherson!

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2013-04-11 14:16:10
190Network architecture / Computing / Internet standards / Computer network security / Hacking / Domain Name System Security Extensions / DNS spoofing / Name server / Extension mechanisms for DNS / Domain name system / Internet / Internet protocols

U NIVERSITY OF A MSTERDAM S YSTEM AND N ETWORK E NGINEERING Research Project 2: Identifying Patterns in DNS Traffic

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-08-19 08:25:34
UPDATE