Web Proxy Autodiscovery Protocol

Results: 34



#Item
1MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2016-05-23 09:25:07
2Setup TorGuard proxy with FireFox & Internet Explorer Here is how to configure Proxifier with a TorGuard SOCKS5 proxy. Please note: Proxifier only works for browsers like firefox, internet explorer, ect. This does NOT wo

Setup TorGuard proxy with FireFox & Internet Explorer Here is how to configure Proxifier with a TorGuard SOCKS5 proxy. Please note: Proxifier only works for browsers like firefox, internet explorer, ect. This does NOT wo

Add to Reading List

Source URL: torguard.net

Language: English - Date: 2012-12-11 10:19:00
3Table of Contents 1 FAQ AND ERROR MESSAGES ................................................................. 2  1.1

Table of Contents 1 FAQ AND ERROR MESSAGES ................................................................. 2 1.1

Add to Reading List

Source URL: www.saphymo.de

Language: English - Date: 2013-03-05 05:31:09
4SBAdmin Web Interface Installation Guide

SBAdmin Web Interface Installation Guide

Add to Reading List

Source URL: www.storix.com

Language: English - Date: 2015-02-26 13:37:12
5Configuring the Proxy Settings We can now configure a Proxy Setting that will work at school and at home by using a Proxy Pac file. When at home, this file canʼt be reached and therefore, no proxy is used as desired. 1.

Configuring the Proxy Settings We can now configure a Proxy Setting that will work at school and at home by using a Proxy Pac file. When at home, this file canʼt be reached and therefore, no proxy is used as desired. 1.

Add to Reading List

Source URL: www.ceodow.catholic.edu.au

Language: English - Date: 2013-01-31 00:21:58
6Analyzing the MD5 collision in Flame Alex Sotirov Co-Founder and Chief Scientist Trail of Bits, Inc  Overview of Flame

Analyzing the MD5 collision in Flame Alex Sotirov Co-Founder and Chief Scientist Trail of Bits, Inc Overview of Flame

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2015-03-30 11:47:11
7The ProxEye User’s Manual (Document revision[removed]  © [removed]

The ProxEye User’s Manual (Document revision[removed] © [removed]

Add to Reading List

Source URL: www.bajai.com

Language: English - Date: 2008-03-07 14:34:21
8 Threats  to DNS  DNSSEC

 Threats to DNS  DNSSEC

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2010-11-13 10:13:08
9 Threats  to DNS  DNSSEC

 Threats to DNS  DNSSEC

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2010-11-13 10:14:27
10CIT Wireless Network Configuration Guide for Mac OS X System Requirements  

CIT Wireless Network Configuration Guide for Mac OS X System Requirements  

Add to Reading List

Source URL: cit.edu.au

Language: English - Date: 2012-01-03 23:45:59