Spoofing

Results: 545



#Item
401World Wide Web / Internet privacy / Computer networking / Network performance / Proxy server / Hypertext Transfer Protocol / Web cache / DNS spoofing / Web server / Computing / HTTP / Internet

Microsoft Word - HTTP Request Smuggling WP - FINAL.doc

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 15:07:22
402Electronic engineering / Telecommunications / Caller ID spoofing / Deception / Voucher / Social engineering / School voucher / Caller ID / Telephony / Education

SecurityAlertCellPhoneVouchers

Add to Reading List

Source URL: www.countryclubbank.com

Language: English - Date: 2014-03-11 12:44:52
403Network architecture / Domain Name System Security Extensions / Name server / Dan Kaminsky / PROTECT IP Act / DNS spoofing / Comparison of DNS server software / Domain name system / Internet / Computing

Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill May 2011 Authors:

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2011-05-31 18:07:29
404Network architecture / Domain Name System Security Extensions / DNS spoofing / DNS hijacking / Email spam / MAAWG / Dynamic DNS / Fast flux / PROTECT IP Act / Domain name system / Internet / Computing

December 8th, 2011 The Honorable Patrick Leahy U.S. Senate Chairman, Committee on the Judiciary 224 Dirksen Senate Office Building Washington, DC 20510

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2011-12-08 15:48:59
405Computing / Malware / Electronic voting / DNS spoofing / Denial-of-service attack / Computer worm / Computer virus / Exploit / Botnet / Computer network security / Cyberwarfare / Computer security

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [removed]

Add to Reading List

Source URL: www.electioncenter.org

Language: English - Date: 2007-03-13 00:00:00
406Routing / Internet standards / Computer network security / Networking hardware / Router / Server appliance / Classless Inter-Domain Routing / Traffic flow / IP address spoofing / Network architecture / Computing / Internet

MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
407Denial-of-service attacks / Internet / Cyberwarfare / IP traceback / IP address spoofing / Denial-of-service attack / Firewall / Router / Packet switching / Computing / Network architecture / Computer network security

MULTOPS: a data-structure for bandwidth attack detection Thomer M. Gil and Massimiliano Poletto Vrije Universiteit, Amsterdam, The Netherlands and M.I.T., Cambridge, MA, USA {thomer,maxp}@lcs.mit.edu

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
408Network architecture / Denial-of-service attack / UDP flood attack / Transmission Control Protocol / IP address spoofing / Robust random early detection / Router / Broadcast radiation / Network congestion / Denial-of-service attacks / Computer network security / Computing

MULTOPS: a data structure for denial-of-service attack detection by Thomer M. Gil [removed] Submitted to the Division of Mathematics and Computer Science

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
409Computer-mediated communication / Spamming / Spam filtering / Email spam / Email filtering / Spam / Electronic mailing list / Anti-spam techniques / Email spoofing / Email / Internet / Computing

Microsoft Word - BlockedEmailPrevention.doc

Add to Reading List

Source URL: www.adhhomecare.org

Language: English - Date: 2014-08-01 11:48:04
410Network architecture / Internet protocols / Internet standards / Name server / Domain Name System Security Extensions / Domain name / DNS spoofing / BELNET / Server / Domain name system / Internet / Computing

Domain Name Registration and DNS services (primary, secondary and recursive) To make your network(s), computers, web servers and other applications known on the internet, you need domain names. Organisations connected to

Add to Reading List

Source URL: belnet.be

Language: English - Date: 2014-09-08 09:01:07
UPDATE