Spoofing

Results: 545



#Item
31Hypertext Transfer Protocol / Cross-site request forgery / Internet privacy / JavaScript / Ajax / Computer network security / Same-origin policy / Cross-site scripting / HTTP cookie / Referer spoofing / Session fixation / XMLHttpRequest

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-10-31 13:52:34
32

Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures Md Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl Gunter, Matthew Caesar, Tarek Abdelzaher Department of Computer Science University of

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2011-04-27 23:38:00
    33

    LNCSActivity Spoofing and Its Defense in Android Smartphones

    Add to Reading List

    Source URL: www.cs.wm.edu

    Language: English - Date: 2015-03-22 23:42:32
      34Internet Standards / Domain name system / Internet protocols / Hacking / Internet ethics / Dynamic Host Configuration Protocol / Name server / DNS spoofing / Infoblox / IP address / BIND / Comparison of DNS server software

      White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems

      Add to Reading List

      Source URL: www.gtri.com

      Language: English - Date: 2014-09-02 15:27:00
      35

      Dear Valued Customer, Recently, there have been reports in the media concerning “spoofing” in which a trader, never intending to execute a trade, places an order and then cancels it in order to give the appearance of

      Add to Reading List

      Source URL: www.bgcpartners.com

      Language: English - Date: 2016-01-13 12:21:26
        36Spam filtering / Email authentication / DMARC / DomainKeys Identified Mail / Sender Policy Framework / Simple Mail Transfer Protocol / Email / DomainKeys / Gmail / Outlook.com / Author Domain Signing Practices / Email spoofing

        Guide DMARC: Monitor & secure your email delivery Chris Nagele Founder of Wildbit

        Add to Reading List

        Source URL: postmarkapp.com

        Language: English - Date: 2015-12-24 12:33:02
        37Global Positioning System / Satellite navigation systems / Geography / Spaceflight / Navigation / GPS Block IIF / Selective availability anti-spoofing module / GPS satellite blocks / GPS Block IIIA / Quasi-Zenith Satellite System / Satellite navigation / Space and Missile Systems Center

        Space and Missile Systems Center Global Positioning Systems Directorate SPACE AND MISSILE SYSTEMS CENTER GPS Enterprise View

        Add to Reading List

        Source URL: scpnt.stanford.edu

        Language: English - Date: 2015-11-25 02:07:47
        38

        Web Spoofing 2001 Yougu Yuan Eileen Zishuang Ye Sean Smith

        Add to Reading List

        Source URL: www.ists.dartmouth.edu

        Language: English - Date: 2008-09-11 13:39:44
          39Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

          DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

          Add to Reading List

          Source URL: www.nlnetlabs.nl

          Language: English - Date: 2009-06-27 06:06:52
          40Domain name system / Computing / Internet / Network architecture / DNS spoofing / OpenDNS / Name server / Dynamic DNS / Fast flux / IID / Dan Kaminsky / Botnet

          IID WHITE PAPER Surveying the DNS Threat Landscape by Rod Rasmussen and Paul Vixie Executive summary Strong enterprise security in 2013 requires a

          Add to Reading List

          Source URL: internetidentity.com

          Language: English
          UPDATE