Spoofing

Results: 545



#Item
201Traceroute / Computer network security / Timestamp / Transmission Control Protocol / Ping / IP address spoofing / Internet Protocol / Communications protocol / Computing / System software / Data

Applications of the IP Timestamp Option to Internet Measurement Justine Sherry A senior thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-08-10 16:37:20
202Certificate authority / Transport Layer Security / Code signing / Public key certificate / Public key infrastructure / Key size / DNS spoofing / Dynamic SSL / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2012-09-11 18:21:26
203Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / BIND / Internet / Domain name system / Internet protocols

Securing DNS by Deploying DNSSEC Steven Bonneville Manager – Linux Curriculum, Red Hat June 2010

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-07-06 11:48:56
204Text messaging / SMS / Short message service center / MHealth / Medic Mobile / SMS spoofing / Technology / Mobile technology / FrontlineSMS

Communications for change: How to use text messaging as an effective behavior change campaigning tool Produced by FrontlineSMS and Text to Change

Add to Reading List

Source URL: www.frontlinesms.com

Language: English - Date: 2014-10-28 21:27:02
205Geodesy / Satellite navigation systems / Avionics / Global Positioning System / GPS signals / Differential GPS / GPS navigation device / Spoofing attack / Selective availability anti-spoofing module / GPS / Technology / Navigation

GPS Software Attacks Tyler Nighswander Brent Ledvina Jonathan Diamond

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
206Iridium Communications / SMS / Roaming / Text messaging / Tru / Hutchison 3G / GSM services / SMS spoofing / Technology / Mobile technology / Wireless

Page 1 of 2 CRITICAL INFORMATION SUMMARY PIVOT $60 PLAN (IRIDIUM NETWORK) Information about the Service The service provided is a Pivotel Satellite mobile satellite service which uses the Iridium low earth orbit

Add to Reading List

Source URL: www.pivotel.com.au

Language: English - Date: 2013-02-28 04:01:23
207Iridium Communications / SMS / Roaming / Text messaging / Tru / Hutchison 3G / GSM services / SMS spoofing / Technology / Mobile technology / Wireless

Page 1 of 2 CRITICAL INFORMATION SUMMARY PIVOT $45 PLAN (IRIDIUM NETWORK) Information about the Service The service provided is a Pivotel Satellite mobile satellite service which uses the Iridium low earth orbit

Add to Reading List

Source URL: www.pivotel.com.au

Language: English - Date: 2013-02-28 04:01:17
208Iridium Communications / SMS / Roaming / Text messaging / Tru / Hutchison 3G / GSM services / SMS spoofing / Technology / Mobile technology / Wireless

Page 1 of 2 CRITICAL INFORMATION SUMMARY PIVOT $80 PLAN (IRIDIUM NETWORK) Information about the Service The service provided is a Pivotel Satellite mobile satellite service which uses the Iridium low earth orbit

Add to Reading List

Source URL: www.pivotel.com.au

Language: English - Date: 2013-02-28 04:01:21
209Internet protocols / Domain name system / Load balancing / Multimedia / Content delivery network / DNS spoofing / Computing / Network architecture / Concurrent computing

Optimize service performance with smart DNS response MODULE For SIP and other mission-critical network services, low latency is essential to a good customer experience. Latency problems can occur when traffic is being d

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2014-12-22 11:44:23
210Network architecture / Computer network security / Email / Internet protocols / Internet standards / DNS spoofing / Border Gateway Protocol / Name server / Egress filtering / Internet / Domain name system / Computing

On the Mismanagement and Maliciousness of Networks Jing Zhang† , Zakir Durumeric† , Michael Bailey† , Mingyan Liu† , and Manish Karir‡ † Computer Science and Engineering

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:22
UPDATE