Spoofing

Results: 545



#Item
511Computer security / Network address translation / Transmission Control Protocol / Stateful firewall / Proxy server / Firewall / IP address spoofing / Idle scan / Open port / Computer network security / Computing / Internet

Spying in the Dark: TCP and Tor Traffic Analysis Yossi Gilad and Amir Herzberg

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2012-06-11 12:12:27
512Computing / Domain Name System Security Extensions / DNS spoofing / Reverse DNS lookup / Name server / Fully qualified domain name / Forward-confirmed reverse DNS / TSIG / Domain name system / Internet / Network architecture

Port 53 Wars Security of the Domain Name System and Thinking About DNSSEC

Add to Reading List

Source URL: pages.uoregon.edu

Language: English - Date: 2007-02-11 00:49:00
513Satellite navigation systems / Avionics / Geodesy / Global Positioning System / GPS signals / GPS navigation device / Spoofing attack / GPS modernization / Error analysis for the Global Positioning System / GPS / Technology / Navigation

Appeared in Homeland Security Journal, December 12, 2003, http://www.homelandsecurity.org/bulletin/Dual%20Benefit/warner_gps_spoofing.html. LAUR[removed]

Add to Reading List

Source URL: www.ne.anl.gov

Language: English - Date: 2012-04-02 05:30:51
514Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2004-04-16 10:35:25
515Hacking / MAC spoofing / JSTOR / IP address / Aaron Swartz / Network service / Computer network / Host / Email / Computing / Technology / Electronics

N:ymanne Filesrtzrging Documentsrtz Indictment Final.wpd

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-07-19 14:13:11
516Network architecture / Name server / DNS spoofing / Domain Name System Security Extensions / DNS zone / DNS hijacking / OpenDNS / Captive portal / Time to live / Domain name system / Internet / Computing

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority David Dagon1 Niels Provos2

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2008-02-15 01:18:50
517

Attacchi login: Spoofing, Sniffing, Phishing, Keyloggers Patrick Assirelli

Add to Reading List

Source URL: www.cs.unibo.it

Language: Italian - Date: 2009-06-10 04:24:59
    518Cyberwarfare / Pharming / Router / DNS spoofing / Internet security / Denial-of-service attack / Network address translation / Default gateway / Tor / Computer network security / Computing / Internet

    Drive-By Pharming Sid Stamm Indiana University,

    Add to Reading List

    Source URL: www.symantec.com

    Language: English - Date: 2007-02-14 11:07:57
    519Notary / Smart cards / Security token / Digital signature / DNS spoofing / Public key certificate / Cryptographic Service Provider / Card reader / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

    Practical Security Aspects of Digital Signature Systems Florian Nentwich, Engin Kirda, and Christopher Kruegel Secure Systems Lab, Technical University Vienna

    Add to Reading List

    Source URL: www.iseclab.org

    Language: English - Date: 2009-05-16 01:50:23
    520Hand geometry / Plaster / Lifecasting / Geometry / Formal verification / Casting / Authentication / Visual arts / Security / Biometrics

    Spoofing Hand Geometry Systems Using Fake Hands

    Add to Reading List

    Source URL: www.biometrics.org

    Language: English - Date: 2010-06-02 18:00:59
    UPDATE